Summary
In this chapter, we understood the concept of virtual private networks and their role in networks. We looked at the various types of VPNs and their tunneling protocols. We also studied how, just like smugglers, VPNs are used to ship foreign protocols via tunnels into a corporate network. At the end of the chapter, we looked at the ways in which the VPNs can be compromised and consequently, further lead to the compromise of our networks.
In the next chapter, we gear up to look at how to investigate malware, which is one of the major causes of network incidents. Malware has been on an evolutionary spiral and has emerged as a potent cyber weapon used to compromise digital resources across the globe.