BN305 - Virtual Private Networks Assignment

Assignment Help Other Subject
Reference no: EM132426161

BN305 - Virtual Private Networks Assignment - Melbourne Institute of Technology, Australia

Assessment Title - SSL/TLS VPN Technologies

Purpose of the assessment (with ULO Mapping) - The purpose of this assignment is to review existing literatures on important VPN technologies and issues and write a report. The report must be specific to the given topics, use appropriate examples and detail of the topic given to develop a review paper. In preparing the assignment, students should acquire not only the knowledge of current technical aspects of VPN but also research, data collection, analysis and writing skills. Students should be able to demonstrate their achievements in the following unit learning outcomes:

a. Explain the significance of VPN for contemporary organisations.

b. Discuss the role of VPN to support the security of businesses.

Assignment Questions:

Objective: Your tasks are to analyse and to write a report about the processes and the security technologies being used when you access any website (which uses HTTPS) online via a web browser, as well as having the ability to remotely accessing your company network online securely. It is a well- known fact that the Internet is a public network and every single message you exchange with the server can potentially be intercepted by attackers. You need to analyse in detail to address the technologies and techniques that can be used to prevent attackers from modifying the communication between you and web server in addition to keeping your passwords and other details safe.

A. Literature Review:

Research about the different methods for securing the transfer of information across internet service provider. This should include the following:

1. You need to explain the significance of VPN for contemporary organisations. This should cover the different encryption protocols for VPN implementation, including a comparison of SSL/VPN and IPSEC/VPN.

2. IPsec uses the Internet Key Exchange (IKE) protocol to negotiate and establish secured site- to-site or remote-access VPN tunnels. Investigate how Cisco Adaptive Security Appliances (ASA 5500 Series) would support IPsec and IKE.

3. Discuss the role of VPN in supporting the security of businesses, and describe the advantages of SSL/VPN over IPSEC/VPN.

4. The rapid proliferation of mobile devices increases on a daily basis, investigate how Cisco AnyConnect is designed to secure the connections from these mobile devices.

You are also required to address the following topics and task in details:

B. Authentication and Access Control

You need to visit a particular web site and discuss the following points:

1. Analyse and write report on how the browser ensures that it is communicating to the right server. Visit a website and add screenshots also highlighting the related part. Explain how SSL and TLS provide authentication?

2. Describe how digital signatures work and what role it plays in the authentication process, add the relevant screenshot from your web browser showing the details of signature. What happens during certificate verification?

3. Analyse and comment on how the server make sure that it is communicating to the right client, discuss several methods; e.g. if you are using MIT Moodle, how the server verifies that it's actually YOU?

C. Confidentiality and Integrity

1. Analyse and write a report on how the confidentiality and integrity is achieved in SSL communication, and how server & client agree on one cipher suit?

2. Explain what is the role of symmetric encryption and hash algorithms in SSL communication. Add/take screenshots from your browser showing symmetric encryption and hash details.

3. Describe the VPN client software options.

D. Anti-Replay

1. Analyse and write a report on how the anti-replay attacks are mitigated in SSL communication.

2. How to protect your organization against SSL attacks?

E. Remote Access to database server

1. Analyse and comment on how to access your content remotely, in your company database server.

2. Explain what possible attacks you might face.

Strictly follow the IEEE reference format for in-body citations and the references section.

Reference no: EM132426161

Questions Cloud

Accept the social responsibilities of educated citizens : Use examples from one or more of our assigned readings to document the extent to which you have used your work in this course
Explain the findings of your data analysis : In this assignment, you will analyze the data that you have collected or reviewed. You will prepare the first draft of the discussion and conclusions section.
New stock opportunity or exposure : A friend is excited about a new stock opportunity with a medical company whose products could sell well around the world; having reviewed
What is the difference between racial prejudice and racism : What is the difference between racial prejudice and racism? Give examples of each. What is meant by the term institutional racism?
BN305 - Virtual Private Networks Assignment : BN305 - Virtual Private Networks Assignment Help and Solution - Melbourne Institute of Technology, Australia. Assessment Title - SSL/TLS VPN Technologies
What keeps the majority of society from making that choice : What keeps people like you and I from making a choice of robbing a bank? We both have the ability and I'm sure we both have been in a financial bind.
Current alcan technology infrastructure : What are the pros and cons of the current Alcan technology infrastructure? What are the pros and cons of the new Alcan technology infrastructure proposed
Location of b and t cells in the peripheral lymphoid organs : How do chemokines influence the location of B and T cells in the peripheral lymphoid organs? What happens after antigen activation?
What is the procedure if someone is injured : A major wildfire continues to grow. As the incident commander, answer the following questions: What is the procedure if someone is injured?

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd