Skip to main content
Business LibreTexts

33.14: Virtual Private Networks (VPNs)

  • Page ID
    45714
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)\(\newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    Learning Objectives
    • Discuss how businesses can use Virtual Private Networks (VPNs) to manage information

    A virtual private network (VPN) extends a private network (intranet) across a public network Internet), and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Applications running across a VPN may therefore benefit from the functionality, security, and management of the private network while taking advantage of the flexibility of the Internet. In a business setting, remote-access VPNs allow employees to access their company’s intranet from home or while traveling outside the office. Site-to-site VPNs allow employees in geographically separated offices to share one cohesive virtual network.

    Figure \(\PageIndex{1}\): Internet VPN

    To ensure security, the VPN connection is established using encryption protocols and VPN users use authentication methods, including passwords or certificates, to gain access to the VPN.

    Although VPNs cannot make online connections completely secure, they can increase privacy and security. For example, to prevent disclosure of private information, VPNs typically allow only authenticated remote access using encryption techniques.

    Some of the security advantages of a VPN include the following:

    • even if the network traffic is accessed, an attacker would see only encrypted data
    • sender authentication is required to prevent unauthorized users from accessing the VPN
    • the VPN messaging is designed to detect instances of tampering with transmitted messages

    As security concerns continue to grow in the digital age, more and more companies are emerging to serve the growing demand for VPN services. Which service a business chooses will be determined by its planned uses for the VPN.

    Contributors and Attributions

    CC licensed content, Original
    • Virtual Private Networks (VPNs). Authored by: Linda Williams. Provided by: Lumen Learning. License: CC BY: Attribution
    CC licensed content, Shared previously

    33.14: Virtual Private Networks (VPNs) is shared under a not declared license and was authored, remixed, and/or curated by LibreTexts.

    • Was this article helpful?