Skip to document

ACLs and VPNs - An informative material about the benefits, similarities, and differences between

An informative material about the benefits, similarities, and differen...
Course

General Computer Science (COS 126)

3 Documents
Students shared 3 documents in this course
Academic year: 2021/2022
Uploaded by:
0followers
1Uploads
21upvotes

Comments

Please sign in or register to post comments.

Preview text

ACLs and VPNs

Student’s Name Instructor University Course Date

ACLs and VPNs A Virtual Private Network, abbreviated as VPN, protects a network connection by encrypting data and hiding the IP address to obscure the online identity of the internet user. According to He (2021), a VPN is the right solution to protect the network perimeter since it allows only authorized users to access particular network resources. Concurrently, the security service provides a threat management system that is unified and centralized to curb insecure access and manipulation.

Like laptops and desktops, mobile devices such as smartphones are also referred to as personal computers. Therefore, VPNs also protect them through anonymized data and quality encryption. VPNs for mobile devices target offering protection against apps using personal data such as online banking apps and particular websites and search engines that collect personal data and browsing behavior. VPNs are effective on mobile devices by protecting personal data to avoid break-ins and making it impossible to hack data.

Similarities and Differences between ACL and Firewalls

Differences between ACLs and Firewalls

Despite some similarities, the Access Control Lists (ACLs) and firewalls are different based on security approaches. Tian et al. (2019) imply that an ACL is different from a firewall based on the use and purpose for which they operate. Substantially, Joshi and Gupta (2020) state that ACL filters traffic through interfaces, filters routing updates, identifies interesting traffic in a dialer-list and makes routing decisions in policy-based routing. On the other hand, a firewall exhibits differences in performance which includes examining traffic and inspecting the Transmission Control Protocol (TCP) and the acknowledgement. Therefore, it can determine the encryption and the flow of the TCP conversation from the beginning.

References

He, X. (2021). Research on Computer Network Security Based on Firewall Technology. Journal of Physics: Conference Series , 1744 (4), 042037. doi/10.1088/1742-6596/1744/4/

Joshi, R. & Gupta, B. (2020). Security, Privacy, And Forensics Issues in Big Data. IGI Global. ISBN: 9781522597445 Tian, B., Zhang, X., Zhai, E., Liu, H., Ye, Q., & Wang, C. et al. (2019). Safely and automatically updating in-network ACL configurations with intent language. Proceedings of The ACM Special Interest Group on Data Communication. doi/10.1145/3341302.

Was this document helpful?

ACLs and VPNs - An informative material about the benefits, similarities, and differences between

Course: General Computer Science (COS 126)

3 Documents
Students shared 3 documents in this course
Was this document helpful?