SlideShare a Scribd company logo
2
Most read
3
Most read
5
Most read
V.P.N and Proxy
Servers
Presented by: Eissa Abdullah AL-
Owayied
Instructor: Muhammad AL-Jawarneh
We Will focus more on these following
Servers:
 V.P.N
 Proxy
What is V.P.N?.
V.P.N is an acronym for “Virtual Private
Network”.
‫الخاصة‬ ‫االفتراضية‬ ‫الشبكة‬
V.P.N enables computers to Send/Receive
data across shared in public networks(with
Security and Encryption) as if it were
directly connected to the private network.
Example of a simple V.P.N
connection
Saudi Arabia
United States
Saudi Arabia
United States
When hacker
attacks, V.P.N
finds another
path
Anything else?...
V.P.N Supports sending data to different
computers, with privacy and security, Sending
data through V.P.N Tunnel, and when Hacker
attacks, it find another way and build tunnel
with it. If hacker somehow stole the file, it
would be useless because the file will be
encrypted .
V.P.N is a Client/Server Software and Hardware
technology, there are different brands, and they
don’t necessarily connect to each other.
Client
Client
Client
An example of V.P.N
Server used inside
global organization
V.P.N ServerServer Host
ClientAn example of V.P.N
Server used between 2
individuals
V.P.N Server
What is may be bad?.
 If you have a slow connection speed,
it would be a terrible performance for
send/receive data for all clients.
 Some I.S.P providers in different
countries, didn’t change the outdated
Wires cables for internet users, So
V.P.N will shutdown everytime,
thinking that it might be a hacker
attack.
Proxy Server
)‫الوكيل‬ ‫الخادم‬)
What is Web Proxy Server?.
 A computer network service that allows
clients to make indirect network
connections to other network services.
 Proxy is used for many purposes, like
hacking, spamming, surfing blocked
websites, remove surfing surveillance,
Connecting secretly to outside computers
connecting Local computers to the
internet(In old days) and many other
things.
IP Address:
1.1.1.1
Blocked
Proxy servers
IP Address:
1.1.1.1
IP Address:
2.2.2.2
Proxy servers: multiple
connection for safety
IP Address:
3.3.3.3
IP Address:
2.2.2.2
IP Address:
1.1.1.1
IP Address:
4.4.4.4
IP Address:
5.5.5.5
Proxy servers: multiple
connection for safety
+ V.P.N Server
IP Address:
3.3.3.3
V.P.N Server
IP Address:
1.1.1.1
IP Address:
4.4.4.4
IP Address:
5.5.5.5
Anything else?...
You can connect to a Web proxy server
by either using applications, web
browsers, website proxies and etc.
Web Proxy and V.P.N can be used both
for safety, encryption and protection.
What is be bad?.
 Web proxies can slow connection speed
performance, due to the distance
between the client and proxy servers.
 always cause a threat to internet
websites. Governments try to indices
hackers by tracking them back to proxy
servers.
 Proxy server providers can easily steal
client’s information, and send malicious
viruses back to their devices, so it’s
important to use firewall and V.P.N
Servers for your protection.
Thank you…

More Related Content

PDF
Defense mechanism for ddos attack through machine learning
PDF
Overview of the Cyber Kill Chain [TM]
PPT
Security Measures
PPTX
Cyber security
PDF
Basics of Cyber Security
PPTX
Cybersecurity 1. intro to cybersecurity
PPTX
securityawareness.pptx
PPTX
Man in the middle attack .pptx
Defense mechanism for ddos attack through machine learning
Overview of the Cyber Kill Chain [TM]
Security Measures
Cyber security
Basics of Cyber Security
Cybersecurity 1. intro to cybersecurity
securityawareness.pptx
Man in the middle attack .pptx

What's hot (20)

PPT
Information warfare, assurance and security in the energy sectors
PPTX
Intrusion detection
PPTX
Cyber warfare
PDF
Ceh v5 module 14 sql injection
PDF
Cybersecurity Employee Training
PPTX
Cyber Threat Intelligence.pptx
PDF
The importance of Cybersecurity
PPTX
Destributed denial of service attack ppt
PPTX
Cyber Crime and Cyber Security
PDF
Cybersecurity concepts & Defense best practises
PPTX
Intrusion detection system
PPTX
Physical access control
PPTX
Firewalls
PPT
Computer Worms
PPTX
Ransomware
PPTX
IT Security
PPTX
Wireless and mobile security
PPTX
Cyber security & awareness
ODP
Email security
PPTX
Web application attacks
Information warfare, assurance and security in the energy sectors
Intrusion detection
Cyber warfare
Ceh v5 module 14 sql injection
Cybersecurity Employee Training
Cyber Threat Intelligence.pptx
The importance of Cybersecurity
Destributed denial of service attack ppt
Cyber Crime and Cyber Security
Cybersecurity concepts & Defense best practises
Intrusion detection system
Physical access control
Firewalls
Computer Worms
Ransomware
IT Security
Wireless and mobile security
Cyber security & awareness
Email security
Web application attacks
Ad

Similar to V.P.N And Proxy server (20)

PPTX
cybersecurity unit 5 basics of cybersecurity
PPT
Securely managed and timed proxy server
PPTX
Firewall vpn proxy
PPTX
Proxy Server: A Comprehensive Guide
PPTX
Contourner la censure
PDF
VPN - Virtual Private Network
PPT
Group20 Dynamic Networks
PDF
Proxy Server
PPT
Web Proxy Server
PDF
Lan Virtual Networks
PPT
VPN vs. PROXY
PDF
VPN vs Proxy: Which One Should You Use?
PPT
Proxy Servers
PDF
VPN WORKSHOP FROM BASICS TO SETUP SLIDES.pdf
PPT
Firewall with proxy server.
PDF
Virtual private network chapter 1 PSU.pdf
PPT
Proxy Servers
PPTX
Group18_Awesome4some:Proxy server.ppt
PPTX
Tools and methods used in cyber crime
PPT
Shradhamaheshwari vpn
cybersecurity unit 5 basics of cybersecurity
Securely managed and timed proxy server
Firewall vpn proxy
Proxy Server: A Comprehensive Guide
Contourner la censure
VPN - Virtual Private Network
Group20 Dynamic Networks
Proxy Server
Web Proxy Server
Lan Virtual Networks
VPN vs. PROXY
VPN vs Proxy: Which One Should You Use?
Proxy Servers
VPN WORKSHOP FROM BASICS TO SETUP SLIDES.pdf
Firewall with proxy server.
Virtual private network chapter 1 PSU.pdf
Proxy Servers
Group18_Awesome4some:Proxy server.ppt
Tools and methods used in cyber crime
Shradhamaheshwari vpn
Ad

V.P.N And Proxy server

  • 1. V.P.N and Proxy Servers Presented by: Eissa Abdullah AL- Owayied Instructor: Muhammad AL-Jawarneh
  • 2. We Will focus more on these following Servers:  V.P.N  Proxy
  • 3. What is V.P.N?. V.P.N is an acronym for “Virtual Private Network”. ‫الخاصة‬ ‫االفتراضية‬ ‫الشبكة‬ V.P.N enables computers to Send/Receive data across shared in public networks(with Security and Encryption) as if it were directly connected to the private network.
  • 4. Example of a simple V.P.N connection
  • 6. Saudi Arabia United States When hacker attacks, V.P.N finds another path
  • 7. Anything else?... V.P.N Supports sending data to different computers, with privacy and security, Sending data through V.P.N Tunnel, and when Hacker attacks, it find another way and build tunnel with it. If hacker somehow stole the file, it would be useless because the file will be encrypted . V.P.N is a Client/Server Software and Hardware technology, there are different brands, and they don’t necessarily connect to each other.
  • 8. Client Client Client An example of V.P.N Server used inside global organization V.P.N ServerServer Host
  • 9. ClientAn example of V.P.N Server used between 2 individuals V.P.N Server
  • 10. What is may be bad?.  If you have a slow connection speed, it would be a terrible performance for send/receive data for all clients.  Some I.S.P providers in different countries, didn’t change the outdated Wires cables for internet users, So V.P.N will shutdown everytime, thinking that it might be a hacker attack.
  • 12. What is Web Proxy Server?.  A computer network service that allows clients to make indirect network connections to other network services.  Proxy is used for many purposes, like hacking, spamming, surfing blocked websites, remove surfing surveillance, Connecting secretly to outside computers connecting Local computers to the internet(In old days) and many other things.
  • 15. Proxy servers: multiple connection for safety IP Address: 3.3.3.3 IP Address: 2.2.2.2 IP Address: 1.1.1.1 IP Address: 4.4.4.4 IP Address: 5.5.5.5
  • 16. Proxy servers: multiple connection for safety + V.P.N Server IP Address: 3.3.3.3 V.P.N Server IP Address: 1.1.1.1 IP Address: 4.4.4.4 IP Address: 5.5.5.5
  • 17. Anything else?... You can connect to a Web proxy server by either using applications, web browsers, website proxies and etc. Web Proxy and V.P.N can be used both for safety, encryption and protection.
  • 18. What is be bad?.  Web proxies can slow connection speed performance, due to the distance between the client and proxy servers.  always cause a threat to internet websites. Governments try to indices hackers by tracking them back to proxy servers.  Proxy server providers can easily steal client’s information, and send malicious viruses back to their devices, so it’s important to use firewall and V.P.N Servers for your protection.