his.sePublications
Change search
Refine search result
1 - 1 of 1
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Axelsson, Magnus
    University of Skövde, School of Informatics.
    Privata VPN-anslutningar i nätverk2017Independent thesis Basic level (degree of Bachelor), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    To create a secure connection between two endpoints, over an otherwise insecure network, a VPN tunnel can be used. Traffic in the tunnel is encrypted so that it is hard for an outsider to intercept communication within the tunnel. VPN tunnels can have a negative impact on the network security. For example, existing protection methods may not be able to handle the encrypted traffic within the tunnel, which may lead to unwanted traffic entering the network.

    The purpose of this study is to chart IT managers' potential challenges, regarding unauthorized VPN tunnels, and how these challenges may be handled in various organizations. The purpose of the study is answered through three sub-questions. To answer these questions, a quantitative questionnaire and a qualitative interview study are applied. A total of 52 IT managers participated in the study. 37 IT managers participated in the questionnaire survey and another five participated in the interview study.

    The results show that one of the biggest challenges experienced by the IT-managers is that private VPN connections can act as a way into the network for unwanted network communication, which could result in information theft and destruction of an organization's assets. Furthermore, a majority of the study participants perceived that general user agreements and technical solutions are sufficient to maintain good protection against unauthorized VPN tunnels. This study brings new knowledge to the field of network security as it shows what challenges the IT-managers perceive from VPN tunnels and how those challenges are handled.

1 - 1 of 1
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf