HostedDB - Dedicated UNIX Servers

index_1
Auerbach Publications © 2001 CRC Press LLC 08/01 DATA  SECURITY  MANAGEMENT SECURITY OF VIRTUAL PRIVATE NETWORKS Jim S. Tiller, CISSP I N S I D E Roaming Users; Internet Adoption; Broadband; Extended Access; Open Ended; Access Points; Envelope of Security; Vulnerability Concepts It is no surprise that virtual private networks (VPN) have become tremen- dously popular among many dissimilar business disciplines. Regardless of the vertical market or trade, VPNs can play a crucial role in communi- cation requirements, providing flexibility and prompt return on invest- ment when implemented and utilized properly. The adoption of VPNs has been vast and swift, and as technology advances this trend will only increase. Some of the popularity of VPNs is due to the perceived relative ease of implementing the technology. This perceived simplicity and the promise of cheap, limitless access has created a mad rush to leverage this newfound communication type. Unfortunately, these predominant  char- acteristics of VPNs have overshadowed fundamental security flaws that seem to remain obscure and hidden from the sales glossies and product presentations. This article is dedicated to shedding light on the security risks associated with VPNs and the misunderstanding that VPNs are syn- onymous with security. It is crucial that the reader under- stands the security limitations de- tailed herein have almost nothing to do with VPN technology itself. There are several types of VPN technologies available — for example IPSec, SSL, and PPTP to mention a few — and each has advantages and disadvan- tages depending on the requirements and implementation. In addition, each has various levels of security that can be leveraged to accommo- P A Y O F F    I D E A The adoption of VPNs has been vast and swift and as technology advances, this trend will only in- crease. Some of the popularity of VPNs is due to the perceived relative ease of implementing the technology. This perceived simplicity and the promise of cheap, limitless access has created a mad rush to leverage this new-found communi- cation type. Unfortunately, these towering char- acteristics of VPNs have overshadowed funda- m e n t a l  s e c u r i t y  fl a w s  t h a t  s e e m  t o  r e m a i n obscure and hidden from the sales glossies and product presentations. This article sheds light on the security risks associated with VPNs and the misunderstanding that VPNs are synonymous with security. 87-10-55