Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

Free course

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

2.3 Putting VPN to work

This section is part of the amber and green pathways.

VPN technologies have a range of applications in the real world.

Please complete Quick poll #18 [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)]   now.

Open the poll in a new window or tab then come back here when you’re done.

The TOR browser

The TOR Browser is a web browser designed to maximise the user’s security against attacks on the communications between the user and the wider Internet. TOR stands for ‘The Onion Router’, which is a protocol where the user’s traffic is encrypted and routed through three random TOR relays that could be anywhere in the world, and these relays are changed every few minutes. The third TOR relay then sends the traffic as normal HTTPS traffic without revealing the original source.

TOR can offer security over public wi-fi. An attacker monitoring wi-fi can detect you are using TOR, but that is all.

You can use the TOR browser to access secure sites over public wi-fi. In fact, using random public wi-fi sites and the TOR browser is one of the safest ways for a journalist to send communications in a hostile environment.

By using TOR browser to access ProtonMail and send or receive an encrypted email, an attacker won’t be able to see that you are using ProtonMail to send and receive messages.

When using TOR, you should keep the following points in mind:

  • only download the TOR browser from:
  • don’t add any ‘addons’ to this browser, they may break the security
  • don’t use a VPN as well as TOR as this may also break some aspects of security.

Once you begin to use TOR, you will also notice some host/domain names that read like the following:

  • 3g2upl4pq6kufc4m.onion
  • 33y6fjyhs3phzfjj.onion
  • propub3r6espa33w.onion
  • facebookcorewwwi.onion
  • nytimes3xbfgragh.onion

These are used in the context of the TOR network and what are termed as ‘Onion Services’, which are typically ‘hidden’ in the TOR network.

You can refer to this TOR blog post for more information on the Onion Services.

The Darknet

The Darknet is a component of the Web that is shielded from normal web surfing, and it can only be accessed through TOR. When referring to sites on the Darknet, people are generally talking about TOR Services. TOR Services allow you to create your own web server and have it accessible only to users of TOR.

TOR Services look like this: http://xizazy2kz32bo3ko.onion

These are not routable on the standard Internet, and cannot be opened using a normal browser.

You may like to watch this interesting YouTube talk on the Darknet by ‘Eli the computer guy’.

Activity 3 Network Security Solutions

Timing: Allow about 5 minutes

Drag and drop to match each security solution to its purpose:

Using the following two lists, match each numbered item with the correct letter.

  1. Firewall

  2. Firewalls and VPNs

  3. VPNs

  4. TOR

  • a.Keeping the data you exchange on the internet completely private, even from your internet service provider

  • b.Browsing on the ‘Darknet’

  • c.Permitting or denying network connections based on rules

  • d.Helping users to feel their networks are secure

The correct answers are:
  • 1 = c
  • 2 = d
  • 3 = a
  • 4 = b

Take your learning further

Making the decision to study can be a big step, which is why you'll want a trusted University. The Open University has 50 years’ experience delivering flexible learning and 170,000 students are studying with us right now. Take a look at all Open University courses.

If you are new to University-level study, we offer two introductory routes to our qualifications. You could either choose to start with an Access module, or a module which allows you to count your previous learning towards an Open University qualification. Read our guide on Where to take your learning next for more information.

Not ready for formal University study? Then browse over 1000 free courses on OpenLearn and sign up to our newsletter to hear about new free courses as they are released.

Every year, thousands of students decide to study with The Open University. With over 120 qualifications, we’ve got the right course for you.

Request an Open University prospectus371