Bhatt et.al. (2021) published a document which looked at improving online transactions by incorporating a virtual private network (VPN) into various online financial exchange applications such that the information of the users is protected and to avoid cybercrimes associated with digital monies. In an age where the internet is used basically for every activity including transfer of money, it is very important to do this over more secured network mediums. Public internet connections could be relatively vulnerable to attacks by hackers but with the introduction of VPNs, the confidentiality, integrity and authenticity of data exchanged over unsecure networks can be assured.
A virtual privacy network (VPN) provides a secure connection pathway between the devices in communication even when it is over an unsecure network. It encrypts the communications such that it cannot be accessed by a malware or a hacker device. Some of the VPN protocols discussed included secure shell (SSH), point-to-point tunneling protocol (PPTP), IP security (IPsec), layer 2 tunneling protocol (L2TP), security sockets layer (SSL) and transport layer security (TLS).
The proposed solution of this paper is to include an application level VPN instead of a system level VPN for mobile banking apps. This is because the application level VPN is connected to only when the user opens the banking app thereby securing all forms of communication or activities between the device and the banking transactions carried out. Also, the application level VPN blocks all other applications on the user’s device from accessing the information being exchanged on this banking app. It secures the exchange of money and other information such as passwords and usernames from unsecure network vulnerabilities and attackers.
With increasing sophistication in the use of SSL-evading Trojans and more refined phishing techniques, it has become more important for banks and financial institutions to secure their online platforms. As much as such institutions seek to modernize and increase access to many of their services, data protection and transaction integrity should be a priority. Imbedding an application level VPN as suggested in this research increases online transactions security greatly and is one of the more efficient ways to deal with the issues of attackers and also securing the information of users. This will in the long run increase the trust of customers in their financial institutions.
Patel and Gandhi (2017) also conducted a survey to assess the performance of virtual private networks (VPN). The authors discussed the journey of internet security stating that the initial methods of protecting data was the use of cables to connect private access from public internet lines. Over the years, as internet access increased and connection went global, this method became obsolete and the need for more efficient ways of protecting information flow suddenly increased. The development of the VPN technology was a crucial advancement because of its effectiveness and cost efficiency. Therefore, the use of VPNs has become more widespread due to the need for every user of the internet to secure their communication over the public network. Although there are several options available, the three VPN protocols found to be commonly used included the IPSec, PPTP and SSL types.
According to the paper, VPNs can be categorized into three main groups namely firewall, software and hardware. A firewall approach, as the name suggests, refers to limiting the conditions that allows intruders onto your system by placing restrictions on open ports, the types of networks you connect to or even which protocols you go through. This approach is still considered relatively costly compared to the other options available. The software approach requires installing VPN software on devices which will check and regulate your operations on those devices. This method does not require any additional devices but could slow down or reduce the performance rate of those devices since the system also takes up processing space. The hardware option entails a dedicated processing device that is installed specifically for processing VPN traffic hence encrypts, manages, authenticates as well as perform all other functions of a VPN. This option is preferred by most large companies since it is relatively more secure but is relatively expensive compared to the software version.
The document further discusses the VPN security systems, the various protocols and how they operate and perform their functions as well. On listing the benefits of a VPN system, the author stated that VPN provides more security, internet anonymity, less maintenance costs, access to blocked sites, ability to change IP addresses and ability to share files securely among groups of individuals or workers. These notwithstanding, VPN has disadvantages which includes slow connection, inability to combine different VPN technologies and connection stability which is out of control of the user. Also, since they are mostly internet-based, the user may not have control over its performance and reliability. Precaution and a good understanding of network and its security issues are needed when using VPNs since most of them access public network systems.
In conclusion, the paper states that the virtual private network technology is a very safe way of securing sensitive user details and information. The technology is not very costly and quite easy to use. It comes in different forms and variety suitable for all kinds of purposes therefore the user can decide which type or form best suits their privacy needs.
Yadav & Jeyakumar (2016) proposed using the Graphical Network Simulator (GNS) to mimic the nature of interactions that users seek in their activities with various unsecure networks and then adopting the multiprotocol label switching (MPLS) VPN technology’s traffic engineering ability, develop a traffic protection and control system for users. The MPLS is a preferred form of transport technology for network service providers due to its traffic engineering feature which is unique to this system. It allows providers to maximize their network, optimize traffic flow and utilize their systems effectively.
Tongkaw & Tongkaw (2018) published an article in which they discussed their work in designing a multi virtual local area network (multi VLAN) system over an IPSec VPN campus network which connecst two campuses of the same school over 130 kilometers apart. The two campuses need to share network and sensitive information over public network therefore the VPN is needed to tunnel their communications as it passes through the unsecure public network. The VPN will ensure that the interactions between the two ends of the information flow are secured, encrypted and valuable information are shared safely.
The researchers explain the two parts of the network used by the school that is the IPSec part and the VPN system. The two main important aspects of the system are the tunneling and the security services. Tunneling can be done in one of two ways, which is, using the end-to-end tunneling where the network connections or devices on both ends of the connection are responsible for all the VPN functions that come with the connections such as data encryption and decryption. The other is the node-to-node tunneling which uses a router device to handle the tunneling responsibilities between the two ends of the connection. The security services deal with authentication, access control (firewall) and confidentiality. The research came up with a design to link the Satun campus network with the main campus synchronizing it with CCTV systems, MIS, VoIP among others.