{"id":6698,"date":"2016-01-28T09:55:19","date_gmt":"2016-01-28T14:55:19","guid":{"rendered":"https:\/\/kasperskydaily.com\/uk\/?p=6698"},"modified":"2019-11-22T10:11:38","modified_gmt":"2019-11-22T10:11:38","slug":"vpn-explained","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/vpn-explained\/6698\/","title":{"rendered":"What exactly is a VPN?"},"content":{"rendered":"<p>Over the past few months, there\u2019s been a fair amount of hype surrounding <em>Virtual Private Networks<\/em> or VPN for short. The technology has even found its way into home routers and some of them even employ hardware-accelerated encryption. So, what is VPN and why do we need it at all? We\u2019ll try our best to explain it without getting <em>too<\/em> geeky. \ud83d\ude42<\/p>\n<h3>What is VPN?<\/h3>\n<p>Unfortunately, there\u2019s no straightforward definition of VPN \u2013 not even in manuals. It\u2019s crystal clear, they say: VPN stands for Virtual Private Network. Sleek, heh? It\u2019s absolutely clear what \u2018network\u2019 is in this case. \u00a0\u2018Private\u2019 is also quite straightforward, meaning \u2018not public\u2019. In other words, such network selectively accepts only nodes with certain permissions.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Encryption \u2013 The best approach is to protect your data everywhere and always.  <a href=\"https:\/\/twitter.com\/hashtag\/iteducation?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#iteducation<\/a> <a href=\"https:\/\/t.co\/8rRNPbkb8p\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/8rRNPbkb8p<\/a> <a href=\"http:\/\/t.co\/10xneFQeQ2\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/10xneFQeQ2<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/646007885646929920?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">September 21, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>First, everyone who accesses the private network and all the information they exchange needs to be tagged, so the users and data allowed into the private network could be distinguished from outsiders. Second, it is crucial to hide this information via encryption.<\/p>\n<p>Third, there is a need to maintain the integrity of this private connection, meaning no outsiders should be allowed into the network, the messages should come only from the trusted sources, and the information should not leak anywhere in plaintext. Basically, it\u2019s all about privacy \u2013\u00a0a good analogy is the parties of the rich and famous: everybody\u2019s knows they happen but only a few\u00a0know what happens behind those closed doors.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">7 amazing maps of the Internet ~ <a href=\"https:\/\/t.co\/TmnpLrsAQl\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/TmnpLrsAQl<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/eyecandy?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#eyecandy<\/a> <a href=\"https:\/\/t.co\/MihEySI83n\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/MihEySI83n<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/661566679818903552?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 3, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>As for \u2018Virtual\u2019, that\u2019s rather easy too. It\u00a0means the network is abstracted from the physical substrate (the network thus does not care how many channels it employs, as it works transparently and integrally for all who have access). On the other hand, in most cases the virtual network does not belong to the owner of the physical network.<br>\nFor example, any serious company would require any laptop or mobile device, which connects to any wired or wireless network, to access the corporate network exclusively over the VPN connection. It does not matter how this connection is established \u2013 in most cases, it will employ public connections which won\u2019t even belong to the company. Such connection is called a \u2018tunnel\u2019 \u2013 and mind you, this term would be used multiple times later on.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Free?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Free<\/a> is good, right? What harm can come from free <a href=\"https:\/\/twitter.com\/hashtag\/wifi?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#wifi<\/a>? Worse than you'd think <a href=\"https:\/\/t.co\/HVUd8hLWww\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/HVUd8hLWww<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/infosec?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#infosec<\/a> <a href=\"https:\/\/t.co\/sQasdQCYhh\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/sQasdQCYhh<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/687397550299721729?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 13, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>Why do we need VPN?<\/h3>\n<p>The aforementioned example of a remote laptop connected to the corporate network is one of the most ubiquitous scenarios of using VPN in practice. The user feels at home (or, more accurately, feels at work while being at home, on vacations or in a business trip) and can conveniently access corporate data and services.<\/p>\n<p>Moreover, in the security-consciuous enterprise sector, VPN is enabled by default on all devices used by employees. Even Internet access is deployed through the corporate network,\u00a0which is usually heavily monitored by IT staff.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>What exactly is #VPN and why do we need it? #networking #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FVf3G&amp;text=What+exactly+is+%23VPN+and+why+do+we+need+it%3F+%23networking+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The second most ubiquitous scenario is similar to the one above, but in this case it\u2019s not individual users who connect to a corporate network, but the entire branch offices or buildings. The goal is the same: to incorporate remote and distributed locations into a single, connected organisation.<\/p>\n<p>Anyone can use a VPN to arrange a corporate network: from global enterprises to one-man band companies that are conscious of privacy and data protection.\u00a0\u00a0The VPN can interconnect simple surveillance cameras, alarm systems and the like. With VPN being so simple (since there is no need to stretch a physical cable to all the locations), virtual private networks could function inside one organisation, just for the sake of separating certain departments and systems from one another.<\/p>\n<p>VPNs are frequently used to connect servers and computing clusters to enable better availability and redundancy. The popularity of VPN is also related to the proliferation of cloud networking. Also: all the aforementioned solutions are not temporary: such VPNs are usually maintained over many years.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Security concerns arise as subways get wi-fi. <a href=\"http:\/\/t.co\/sEcNTlSqwX\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/sEcNTlSqwX<\/a> Surf safe, but also consider using a <a href=\"https:\/\/twitter.com\/hashtag\/VPN?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#VPN<\/a> <a href=\"http:\/\/t.co\/BR1cYmrIjl\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/BR1cYmrIjl<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/334428011266985986?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">May 14, 2013<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The opposite to a permanent VPN connection is what\u2019s known as a session-based connection. They are frequently used to enable access to various services which process sensitive financial, healthcare and legal data.<\/p>\n<p>But what good is a temporary connection? \u00a0Well, mobile phones and every day computers can make use of them. \u00a0In our tips for securing Android and iOS devices, we recommended to use a secure VPN connection to a trusted node (your home router of a VPN provider) when connecting to any public network, so your traffic is safe from potential interception\u00a0prying eyes.<\/p>\n<p>https:\/\/twitter.com\/nixcraft\/status\/691029985910337536<\/p>\n<p>Finally, another reason to use VPS\u2019s is to bypass physical limitations. \u00a0For instance,\u00a0accessing web resources which are restricted on a particular territory. \u00a0Indeed, VPS\u2019s for bypassing Netflix region lockouts is one of the more popular reasons people use them. \u00a0Also, according to a\u00a0<a href=\"http:\/\/www.slideshare.net\/globalwebindex\/gwi-social-report-q4-2014\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">report<\/a> by GlobalWebIndex, in 2014 alone, over 166 million people used VPN to access social networks.<\/p>\n<h3>Conclusion<\/h3>\n<p>It is obvious that VPN\u2019s are useful for everyday folk, like you and me as well as huge corporations wanting to keep their secrets safe.\u00a0 This is, of course, a very limited look at the VPN and if you\u2019re still interested, there\u2019s plenty of more technical literature out there on the internet that will give you a much more detailed look at this most useful of technologies.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/videoseries?list=PLPmbqO785Hlu-lW7655fc7XxzjGBSdiut&amp;hl=en_US\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What exactly is a VPN? There has been a lot of buzz around it, but why do we need it?<\/p>\n","protected":false},"author":637,"featured_media":6699,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2026],"tags":[261,1035,1206,97,1279,422],"class_list":{"0":"post-6698","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-encryption","9":"tag-internet","10":"tag-networks","11":"tag-security-2","12":"tag-tunnel","13":"tag-vpn"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/vpn-explained\/6698\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/vpn-explained\/6607\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/vpn-explained\/6569\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/vpn-explained\/7600\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/vpn-explained\/7343\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/vpn-explained\/11175\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/vpn-explained\/5946\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/vpn-explained\/6835\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/vpn-explained\/10204\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/vpn-explained\/10635\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/vpn-explained\/11175\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/vpn-explained\/11175\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/encryption\/","name":"encryption"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/637"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=6698"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6698\/revisions"}],"predecessor-version":[{"id":17802,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6698\/revisions\/17802"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/6699"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=6698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=6698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=6698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}