Cybersecurity essentials - Beginners guide by Costa David & Amadio Gianluca

Cybersecurity essentials - Beginners guide by Costa David & Amadio Gianluca

Author:Costa, David & Amadio, Gianluca
Language: eng
Format: epub
Published: 2020-05-19T00:00:00+00:00


PROXY

VPN

• Lenses and overloads

• Difficult to find genuine

• Unencrypted traffic

• Possibility of interception

• Very popular

• Supported by any software

• Fast and dedicated

• Easy to find

• Encrypted traffic

• Unable to intercept

• Expensive

• Some software does not support them *

* by setting the OS to use a VPN even software that does not support it can be secured

4.4.3.2 Quality of a VPN:

You'll forgive me if I go into this section a little more specific than usual by analyzing terms like Protocols and Privacy Policy.

Let's start by saying what are the Privacy Policies: it is the contract that the operator of a VPN network enters into with the customer, and some VPNs, the best, for example, do not save data on activities (logs) and are located in areas where state control is very bland such as Panama, etc. ...

Let's move on to protocols. These are the methods of encrypting data that travel in VPNs and some protocols are insecure and violated by government agencies such as the NSA, so we must try to buy VPN services that use secure protocols.

In the end the quality of a VPN is calculated based on how it handles customer data, so you need to look for VPNs that do not store information * and that use protocols that guarantee the security of the data that travels within them.

Without going into too much detail, we're going to make a shortlist of available protocols:



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.