Security through a VPN
161
The terminals of the tunnels can be individual computers
or entire networks. For instance, telecommuters or field
staff can connect to the company network via VPN. The lo-
cal network at a branch office can also be connected to
the local network of company headquarters via VPN. Both
of the locations securely connected over VPN must have
an Internet connection at their disposal.
5.2
Security through a VPN
A VPN fulfills the following security requirements for data
transmission:
•
Authenticity
•
Confidentiality
•
Integrity
Authenticity
Authenticity ensures that no unauthorized users can ac-
cess the local network via VPN.
It also makes sure that incoming data actually come from
the registered party and not from another source.
Confidentiality
Confidentiality requires the nondisclosure of data. Confi-
dentiality can be guaranteed by encrypting the data. En-
cryption means that unauthorized third parties cannot ob-
tain any knowledge about the transmitted data.
Integrity
Integrity ensures that the data are not changed, recorded
or diverted during transmission.
Tunnel
Tunnel
Local network A
Local network B
Internet