BN305 - Virtual Private Networks Assignment

Assignment Help Other Subject
Reference no: EM132426161

BN305 - Virtual Private Networks Assignment - Melbourne Institute of Technology, Australia

Assessment Title - SSL/TLS VPN Technologies

Purpose of the assessment (with ULO Mapping) - The purpose of this assignment is to review existing literatures on important VPN technologies and issues and write a report. The report must be specific to the given topics, use appropriate examples and detail of the topic given to develop a review paper. In preparing the assignment, students should acquire not only the knowledge of current technical aspects of VPN but also research, data collection, analysis and writing skills. Students should be able to demonstrate their achievements in the following unit learning outcomes:

a. Explain the significance of VPN for contemporary organisations.

b. Discuss the role of VPN to support the security of businesses.

Assignment Questions:

Objective: Your tasks are to analyse and to write a report about the processes and the security technologies being used when you access any website (which uses HTTPS) online via a web browser, as well as having the ability to remotely accessing your company network online securely. It is a well- known fact that the Internet is a public network and every single message you exchange with the server can potentially be intercepted by attackers. You need to analyse in detail to address the technologies and techniques that can be used to prevent attackers from modifying the communication between you and web server in addition to keeping your passwords and other details safe.

A. Literature Review:

Research about the different methods for securing the transfer of information across internet service provider. This should include the following:

1. You need to explain the significance of VPN for contemporary organisations. This should cover the different encryption protocols for VPN implementation, including a comparison of SSL/VPN and IPSEC/VPN.

2. IPsec uses the Internet Key Exchange (IKE) protocol to negotiate and establish secured site- to-site or remote-access VPN tunnels. Investigate how Cisco Adaptive Security Appliances (ASA 5500 Series) would support IPsec and IKE.

3. Discuss the role of VPN in supporting the security of businesses, and describe the advantages of SSL/VPN over IPSEC/VPN.

4. The rapid proliferation of mobile devices increases on a daily basis, investigate how Cisco AnyConnect is designed to secure the connections from these mobile devices.

You are also required to address the following topics and task in details:

B. Authentication and Access Control

You need to visit a particular web site and discuss the following points:

1. Analyse and write report on how the browser ensures that it is communicating to the right server. Visit a website and add screenshots also highlighting the related part. Explain how SSL and TLS provide authentication?

2. Describe how digital signatures work and what role it plays in the authentication process, add the relevant screenshot from your web browser showing the details of signature. What happens during certificate verification?

3. Analyse and comment on how the server make sure that it is communicating to the right client, discuss several methods; e.g. if you are using MIT Moodle, how the server verifies that it's actually YOU?

C. Confidentiality and Integrity

1. Analyse and write a report on how the confidentiality and integrity is achieved in SSL communication, and how server & client agree on one cipher suit?

2. Explain what is the role of symmetric encryption and hash algorithms in SSL communication. Add/take screenshots from your browser showing symmetric encryption and hash details.

3. Describe the VPN client software options.

D. Anti-Replay

1. Analyse and write a report on how the anti-replay attacks are mitigated in SSL communication.

2. How to protect your organization against SSL attacks?

E. Remote Access to database server

1. Analyse and comment on how to access your content remotely, in your company database server.

2. Explain what possible attacks you might face.

Strictly follow the IEEE reference format for in-body citations and the references section.

Reference no: EM132426161

Questions Cloud

Accept the social responsibilities of educated citizens : Use examples from one or more of our assigned readings to document the extent to which you have used your work in this course
Explain the findings of your data analysis : In this assignment, you will analyze the data that you have collected or reviewed. You will prepare the first draft of the discussion and conclusions section.
New stock opportunity or exposure : A friend is excited about a new stock opportunity with a medical company whose products could sell well around the world; having reviewed
What is the difference between racial prejudice and racism : What is the difference between racial prejudice and racism? Give examples of each. What is meant by the term institutional racism?
BN305 - Virtual Private Networks Assignment : BN305 - Virtual Private Networks Assignment Help and Solution - Melbourne Institute of Technology, Australia. Assessment Title - SSL/TLS VPN Technologies
What keeps the majority of society from making that choice : What keeps people like you and I from making a choice of robbing a bank? We both have the ability and I'm sure we both have been in a financial bind.
Current alcan technology infrastructure : What are the pros and cons of the current Alcan technology infrastructure? What are the pros and cons of the new Alcan technology infrastructure proposed
Location of b and t cells in the peripheral lymphoid organs : How do chemokines influence the location of B and T cells in the peripheral lymphoid organs? What happens after antigen activation?
What is the procedure if someone is injured : A major wildfire continues to grow. As the incident commander, answer the following questions: What is the procedure if someone is injured?

Reviews

Write a Review

Other Subject Questions & Answers

  What are the risks and benefits of sampling

Data sampling is a common strategy used to test and draw conclusions about a larger group of data. Review the CDC's sample statistics on infectious diseases.

  Explain why the united states has not join occasionally

Explain why the United States has not join the occasionally. construct and argument proposing the us should join or continue

  Label key stages of the journey

Once you have decided on your pop culture item, write a blog entry (300-350 words) explaining how your item corresponds to the monomyth.

  How men and women are affected from abortions

Assignment Topic - Sex roles in psychology. Write a 1350 words double spaced paper on how men and women are affected from abortions

  What is your opinion of Dr Jones emotional intelligence

BUS 443 Healthcare Management Assignment - Prepare a written report for the case - Emotional Intelligence in Labor and Delivery

  Conduct a coaching session with pat

BSBLDR501 Develop and use emotional intelligence - Coach emotional intelligence - promote the development of emotional intelligence in others

  Does the current ir system encourage good hrm

Show understanding of a six scholarly or otherwise credible sources -  Show knowledge of the position of at least two employer associations from primary sources. A 'primary source' is something produced by that employer association; ie. a speech, ..

  Post the hyperlink to one federal statute

Post the hyperlink to one federal statute which influences commerce on the internet and summarize in 200 words what that statute accomplishes.

  Dsm multi-axial diagnostic system

List and describe 3 advantages to using the DSM multi-axial diagnostic system.

  Learning curves-approximate learning curve

A woodworker is building a new typeof cabinet and found that it required 100 minutes to complete thefirst cabinet, 79 minutes to complete the second cabinet, and 65minutes to complete the fourth cabinet

  Evaluate the views of freud and nietzsche

Explain, contrast, and evaluate the views of Freud and Nietzsche, on the rationality of religious belief. evaluate the views of Tolstoy and Kierkegaard,

  Discuss the major categories of drugs and alcohol

Discuss the major categories of drugs (Depressants, Stimulants, Cannabis and Opiates) and alcohol. What are the physical and psychological effects of each drug? Provide examples of the consequences for each category of drugs and alcohol.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd