TY - JOUR
T1 - Designing the VPN with Top-Down to Improve Information Security
AU - Scott, Valero Andia Billy
AU - Giancarlo, Sanchez Atuncar
N1 - Publisher Copyright:
© (2024), (Science and Information Organization). All Rights Reserved.
PY - 2024/1/1
Y1 - 2024/1/1
N2 - In this article, presents a systematic review of virtual private networks (VPNs) and their contribution to improving information security, with a particular focus on the Andia Consortium. It examines how VPN technology, through its ability to provide a secure channel for communication between devices, can protect organizations’ valuable digital data against cyber-attacks. Various types of VPN systems, their security strategies, advantages and disadvantages, and their dependence on different protocols and standards are discussed. Additionally, tunneling technology, a key technology in VPN implementation, is explored. Through this study, we seek to identify the benefits and limitations of using VPN to improve information security. This work aims to provide a deeper understanding of how VPNs can be designed from the top down to improve information security in organizations.
AB - In this article, presents a systematic review of virtual private networks (VPNs) and their contribution to improving information security, with a particular focus on the Andia Consortium. It examines how VPN technology, through its ability to provide a secure channel for communication between devices, can protect organizations’ valuable digital data against cyber-attacks. Various types of VPN systems, their security strategies, advantages and disadvantages, and their dependence on different protocols and standards are discussed. Additionally, tunneling technology, a key technology in VPN implementation, is explored. Through this study, we seek to identify the benefits and limitations of using VPN to improve information security. This work aims to provide a deeper understanding of how VPNs can be designed from the top down to improve information security in organizations.
KW - VPN
KW - cyber-attacks
KW - security information
UR - https://www.scopus.com/pages/publications/85197210272
U2 - 10.14569/IJACSA.2024.0150620
DO - 10.14569/IJACSA.2024.0150620
M3 - Article
AN - SCOPUS:85197210272
SN - 2158-107X
VL - 15
SP - 182
EP - 190
JO - International Journal of Advanced Computer Science and Applications
JF - International Journal of Advanced Computer Science and Applications
IS - 6
ER -