Virtual Private Networks: Changing the Way We Use the Internet
This blog will discuss the usage of VPNs in the modern world
GMU HONOR CODE
By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://oai.gmu.edu/the-mason-honor- code-2/ and as stated, I as student member of the George Mason University community pledge not to cheat, plagiarize, steal, or lie in matters related to academic work. In addition, I have received permission from the copyright holder for any copyrighted material that is displayed on my site. This includes quoting extensive amounts of text, any material copied directly from a web page and graphics/pictures that are copyrighted. This project or subject material has not been used in another class by me or any other student. Finally, I certify that this site is not for commercial purposes, which is a violation of the George Mason Responsible Use of Computing (RUC) Policy posted on http://copyright.gmu.edu/?page_id=301 web site."
INTRODUCTION TO VPN'S
In modern times, the Internet has become essential for communication through online networking. As access to the Internet is becoming more readily available every year, the need for secure transmissions of data has increased rapidly. Though there have been several options created in order to offer users a safe form in which information can be sent and received, many are gravitating towards VPNs in order to safely transmit data. VPNs, also known as “Virtual Private Networks,” are private networking systems that carry protected information between multiple parties through both public and private networks. The privacy in VPNs is ensured by encryption traffic that is only shared between authorized users. Before VPNs, computers could send information from one to another through the use of leased lines, such as an ISDN. However, as the cost of these ISDNs were high, many started switching to the cheaper alternative of VPNs in the late 1990’s. Because VPNs were created in a time where the Internet was vastly different from modern forms, there have been questions regarding the safety and efficiency of using these networks. There have been a few scholars to research this topic, however, as there still remains no clear answer, further research is necessary.