Summary
This chapter introduced you to the concept of virtual private networks. As I mentioned in the chapter introduction, I'll expand on many of the topics and issues discussed here in future chapters.
Next up is Chapter 2, "VPN Technologies," where I delve further into technologies used by VPNs to provide protection for data, such as keys, encryption algorithms, hashing functions, and authentication methods.