Abstract
VPN usage across the world has increased due to the COVID-19 pandemic. With companies trying to lay the course through this unfamiliar state, corporations had to implement a Business Continuity Plan which included several elements to maintain a scalable and robust VPN connection. During this time of uncertainty, best practices need to be deployed by corporations and government entities more than ever. The purpose of this study is to highlight the necessary path SD Telecom would take to ensure a secure, reliable network during global traffic surge. Specific VPN solutions, access needs, and eligibility requirements vary based on the end user. The question being investigated is: How does a major telecom company carefully extent VPN services during a novel pandemic? It is hoped this study will inform Information Security personnel and employees about the process and procedures for scaling VPN during a major crisis.
Highlights
The implementation of Virtual Private Network (VPN) usage has been around since the existence of Virtual Circuits
Since the early 1980s, the virtual circuit was created to establish a pathway from the source port to the destination port
Communication between two applications could transmit over a shared connection. This technology advanced with ad-hoc encryption tools to router systems, which decoded data involving the ports of the virtual circuit
Summary
The implementation of Virtual Private Network (VPN) usage has been around since the existence of Virtual Circuits. Communication between two applications could transmit over a shared connection This technology advanced with ad-hoc encryption tools to router systems, which decoded data involving the ports of the virtual circuit. These communication entities prevent hackers from accessing data in transit [1]. There are several elements put into place to secure the company’s VPN and the end users network connection. This remote route is an excellent option for corporation’s with remote workers with international offices to transmit data in a secluded method.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have