Page 100 - Cyber Warnings August 2017
P. 100

2.  IKEv2: Internet Key Exchange version 2 (IKEv2) is the most advanced and fastest protocol
                       available. It’s the newest one yet and gets a 10/10 as the protocol is extremely easy to setup
                       and very stable. However, it doesn’t work on old platforms and is most efficient when
                       implemented over IPsec.

                   3.  PPTP: Short for Point-to-Point Tunneling Protocol, PPTP offers a basic 128-bit encryption. When
                       it comes to specialization, there’s always an opportunity cost, and in PPTP’s case, it’s security.
                       But for what it lacks in security, it more than makes up for in speed. Furthermore, setting up this
                       protocol requires very minimal technical knowhow.

                   4.  L2TP: L2TP, short for Layer 2 Tunnel Protocol, is the complete opposite of PPTP. Think of this
                       protocol as an extremely muscular bodyguard. It’s lean and big but slower compared to other
                       protocols. However, it’s very simple to set up and works on all platforms.

                   5.  SSTP: SSTP, short for Secure Socket Tunneling Protocol, is created and owned by Microsoft. This
                       means that it only works on Windows operating systems and backdoor auditing is out of the
                       question. It’s renowned for its high level of security and ability to bypass strong firewalls. Also, it
                       uses SSLv3 just like OpenVPN.

               So, don’t want ISPs and third-parties to get their greedy hands on your private data? Then, you
               should consider using a VPN to secure and anonymize all your internet traffic and keep it out of
               the reach of surveillance.

               About The Author

               Osama Khan is a cyber-security expert who has mastered the art of internet security & privacy.
               Find himself in becoming a sensei in the field of cybersecurity and how to safeguard your online
               privacy.


               PureVPN offers five different types of VPN protocols.  Learn more at:
               https://www.purevpn.com/vpn-protocols


















                  100    Cyber Warnings E-Magazine – August 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   95   96   97   98   99   100   101   102   103   104   105