From the course: Certified Information Security Manager (CISM) Cert Prep (2022): 3 Information Security Program

Unlock the full course today

Join today to access over 24,200 courses taught by industry experts.

VPNs and VPN concentrators

VPNs and VPN concentrators

- [Instructor] Virtual private networks provide two important security functions to IT administrators. First, site to site VPNs allow the secure interconnection of remote networks, such as connecting branch offices to a corporate headquarters or each other . Second, remote access VPNs provide mobile workers with a mechanism to securely connect from remote locations back to the organization's network. VPN's work by using encryption to create a virtual tunnel between two systems over the internet. Everything that enters one end of the tunnel is encrypted. And then it's decrypted when it exits the other end of the tunnel. From the user's perspective, the network appears to function normally but if an attacker gains access to traffic between the two secure networks, all they see is encrypted information that they can't read. VPNs require an endpoint on the remote network that accepts VPN connections and several different…

Contents