<<

Using VPN For Security FRANK MAY SIR AREA 16 COMPUTER AND TECHNOLOGY MEETING JANUARY 16, 2020 Using VPN for Security

 What is a Virtual (VPN)?  History of VPN  Why is a VPN important to an individual computer user?  What to look for when choosing a VPN solution,  Some recommended solutions  VPN on tablets and phones  Network  Torrenting – A Protocol for Large File Distribution

 History of VPN History of VPN History of VPN History of VPN My Introduction to VPN

VPN Server VPN APP Client APP How Did VPN Become So Popular? How a VPN Works

A (VPN) creates private tunnels for your online activity to pass through.

Cost effective and easy to setup, vastly improving your privacy can be as simple as a software download Basics of VPN

VPN encryption scrambles the contents of your traffic in such a way that it can only be un-scrambled (decrypted) using the correct key. Outgoing data is encrypted before it leaves your device. It’s then sent to the VPN server, which decrypts the data with the appropriate key. From there, your data is sent on to its destination, such as a website. The encryption prevents anyone who happens to intercept the data between you and the VPN server—internet service providers, government agencies, wifi hackers, etc—from being able to decipher the contents.

Incoming traffic goes through the same process in reverse. If data is coming from a website, it first goes to the VPN server. The VPN server encrypts the data, then sends it to your device. Your device then decrypts the data so you can view the website normally.

All of this ensures that VPN users’ internet data remains private and out of the hands of any unauthorized parties.

Difference Between Varying Types of Encryption Include:

• Encryption strength, or the method and degree to which your data is scrambled • How the encryption keys are managed and exchanged • What interfaces, protocols, and ports they use • What OSI layers they run on • Ease of deployment • Performance (read: speed) Where Does IPSec Fit in the OSI 7- layer Stack? Reasons for Using a VPN

• Security on public WiFi • Who is watching? • What information do you transmit? • Protection from ISP • Location anonymity • Surveillance concerns • Access to blocked websites What Does a VPN Hide?

This Photo by Unknown Author is • Browsing History licensed under CC BY-NC-ND • IP and Locations • Location for Streaming • Your Devices • Web Activity (logging is key)

• Also Protects Against Identity Theft Downsides to VPN

• Learning Curve • Download speeds may suffer – increased latency • Complete anonymity really is impossible • Tor provides additional security • Some websites may refuse to work if they detect a VPN is being used – the problem . Choosing Your VPN Provider

• Choosing a VPN Provider is a matter of trust • Paid vs Free VPN’s • Consider how VPN service is making money • “We mean it. Don’t use a free VPN service”

• don’t offer the most current or secure protocols • don’t offer the highest bandwidth and connection speeds to free users • do have a higher disconnection rate • don’t have as many servers in as many countries globally • don’t offer support

• Not all encryption is created equal • Open VPN or IKEv2 protocols are considered good • PPTP has known security risks • VPN logging leaves traces • Does service use multi-chain hop – multiple VPN servers in multiple locations • US services aren’t really private Choosing Your VPN Provider

Read VPN service operational policies – understand affiliates and how to opt out of using them. Spam popups or access to your data

Anonymized support. – Private chat service for support or encrypted email communications

VPN across devices – not just for your computer. Phones, pads and other devices also need protection.

Do they respect your privacy? The point of using a VPN is to protect your privacy, so it’s crucial that your VPN provider respects your privacy, too. They should have a no-log policy, which means that they never track or log your online activities.

Do they run the most current protocol? OpenVPN provides stronger security than other protocols, such as PPTP. OpenVPN is an open-source software that supports all the major operating systems.

Do they set data limits? Depending on your internet usage, bandwidth may be a large deciding factor for you. Make sure their services match your needs by checking to see if you’ll get full, unmetered bandwidth without data limits.

Where are the servers located? Decide which server locations are important to you. If you want to appear as if you’re accessing the Web from a certain locale, make sure there’s a server in that country. Some of the Top VPN Applications Some of the Top VPN Applications Some of the Top VPN Applications Some of the Top VPN Applications Some of the Top VPN Applications VPN Increases Latency Why Do I Need a VPN on a Phone? • Allow you to use Public Network • Really for the same reasons as for any computer • Use same provider for all of your devices

• Choose app and download from Play or App store • Make sure you are downloading the official app • Install application – creating an account – pay for license • Do not recommend permanently running app in background • To use, open the app and turn it on • Normally connect to the server close to you

• Interesting reading: ://www.cnet.com/news • /the-best-mobile-vpns-for-iphone-and-android-compared/ Getting Started With a VPN • Download application for all devices • Sign on • Connect to the closest server

• Can configure using device network settings • Not recommended • Manually update server information • Can’t use application features

• Can implement a VPN on a • Protect all devices on network • Including appliances, plugs, TV’s etc. Choosing a Server

• Closest server for better speeds • Region-based content • Bypass government censorship – server in different country • Specialized servers – streaming video – • Kill switch feature if VPN not available

• A word on protocol • OpenVPN recommended

• IKEv2 if OpenVPN not available This Photo by Unknown Author is licensed under CC • WireGuard - Protocol of the future – very fast BY-SA The Tor Network – “The Onion Router” https://www.pcworld.com/article /2686467/how-to-use-the-tor- Tor Browser browser-to-surf-the-web- anonymously.html