Data Protection in the IT Department
-
Introduction IT Security1 Topic
-
Protection Goals4 Topics|1 Quiz
-
Encryption and Signature3 Topics|1 Quiz
-
Deletion of Data1 Topic|1 Quiz
-
IT-Forensics1 Topic|1 Quiz
-
Safety in the Network4 Topics|1 Quiz
-
Attack Scenarios2 Topics|1 Quiz
-
IT Security in the Overall Concept3 Topics|1 Quiz
-
Cloud Computing1 Topic|1 Quiz
-
IT Security Act and IT Communication2 Topics|1 Quiz
VPN
A Virtual Private Network (VPN) is a private network on a publicly accessible infrastructure such as the Internet, which cannot be viewed by uninvolved parties. Only the communication partners of the same private network can communicate with each other and exchange information.

The conventional VPN is the virtual private (self-contained) communication network. It is not a physical connection of its own, but an existing communication network that is used as a transport medium. Through the VPN, participants of the existing communication network are connected to another network.
For example, you can use the VPN to connect to your company network via your private Wi-Fi. The networks in between (home network and the employee’s Internet) are reduced to the function of an extension cable that connects the computer (VPN partner) exclusively to the assigned network (VPN gateway). Thus, the employee’s connection becomes part of the assigned network and he has direct access to it. Establishing an encrypted network via an unencrypted network is one of the main reasons for using a VPN.
The SSL-VPN (“Secure Sockets Layer Virtual Private Network”) supports solutions that realise encrypted remote access to corporate applications and shared resources without the SSL-VPN partners binding themselves to the corporate network for this purpose. It is a virtual private network (VPN) created using the Secure Sockets Layer (SSL) protocol to establish a secure and encrypted connection to less secure networks.