Access to internal network and services

Assignment Help Basic Computer Science
Reference no: EM133058629

Scenario

As you are aware, many remote users will soon need access to the internal network and services. A remote access and virtual private network (VPN) plan is needed to connect it all together.

The senior network architect has asked you to create the plan that will allow secure remote access to the internal network while preventing unauthorized access. He specifically requested that all information transferred between remote users and the organizational servers be protected against snooping.

Tasks

For this part of the project, perform the following tasks:

1. Research and recommend the most appropriate VPN technology. The most likely solution is either an Internet Protocol Security (IPSec) VPN or SSL/TLS VPN. Describe the VPN technology and explain why it is the best choice for Corporation Techs.

2. Recommend any other forms of remote access that are relevant and describe how they would be used.

3. Create a draft report detailing all information as supportive documentation.

4. Cite sources, where appropriate.

Reference no: EM133058629

Questions Cloud

Neighbor and naive bayes classifiers : What are the various types of classifiers? What is the difference between nearest neighbor and naïve bayes classifiers?
Application of privacy and security rules : Measures to assure the correct application of Privacy and Security Rules. Make sure to consider all perspectives of the access controls.
Firewall and virtual private network : This project provides you an opportunity to solve a comprehensive problem in firewall and virtual private network (VPN) implementation at various levels.
Operational excellence-what does the term packet mean : What does the term packet mean? What is the difference between an intranet and an extranet? What does the term VoIP mean?
Access to internal network and services : As you are aware, many remote users will soon need access to the internal network and services.
Team management and managerial decision making : The content of this class as they relate to Team Management and managerial decision making.
Cryptographic algorithms and information protection : This reading focused on three types of cryptographic algorithms: (1) Secret key, (2) Public key, (3) Hash functions.
Bitgold case study : How could BitGold continue to stay on the right side of the law? How could BitGold market its services to users and merchants, both in Canada and abroad?
Information systems : Choose a relatively small organization that is just beginning to use information systems. What types of systems are being used?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Defeat a human opponent at a board game

Can a computer program be developed to defeat a human opponent at a board game

  Data communication technologies of guided media

Compare and contrast the data communication technologies of guided media and unguided media. This should include transmission media, data link control protocols, and multiplexing.

  Prints the equivalent total number of seconds

Write an application that reads values representing a time duration in hours, minutes, and seconds, and then prints the equivalent total number of seconds.

  Builda flowchart to solve a simple payroll calculation

Builda flowchart to solve a simple payroll calculation. Find the amount of pay given, hours worked, and hourly rate. (The formula to calculate payroll is pay = hourly rate * hours worked.) Use these values to test the calculation: (hours = 30 and ..

  Design and make an class student

The goal is to design and make an class Student that will enable us to compute a student's average.

  What apr does she need to earn

She currently deposits $550 a month into her account 401k, what APR does she need to earn?

  Web browser search for incident response training

Using a Web browser, search for "incident response training". Look through the first five results and identify one or two companies that offer such training.

  Business intelligence

Find information about IBM Watson's activities in the healthcare field. Find information on the five styles of BI.

  Profit function for the profit function

(a) Graph the marginal profit function for the profit function P(x) = 30x - x2 - 200, where P(x) is in thousands of dollars and x is hundreds of units.

  Encryption to protect the spreadsheet

As a security specialist, you must choose the best form of encryption to protect the spreadsheet.

  Characteristics of buyers of hybrid honda civic ima

The accompanying data are from the article "Characteristics of Buyers of Hybrid Honda Civic IMA: Preferences, Decision Process

  Computer science and engineering communication

Computer science and engineering communication

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd