Reference no: EM132476902 , Length: word count:1800
BN305 Virtual Private Networks - Melbourne Institute of Technology
Assignment - SSL/TLS VPN Technologies
The purpose of this assignment is to review existing literatures on important VPN technologies and issues and write a report. The report must be specific to the given topics, use appropriate examples and detail of the topic given to develop a review paper. In preparing the assignment, students should acquire not only the knowledge of current technical aspects of VPN but also research, data collection, analysis and writing skills. Students should be able to demonstrate their achievements in the following unit learning outcomes:
LO1: Explain the significance of VPN for contemporary organisations
LO2: Discuss the role of VPN to support the security of businesses
Assignment Questions:
Objective: Your tasks are to analyse and to write a report about the processes and the security technologies being used when you access any website (which uses HTTPS) online via a web browser, as well as having the ability to remotely accessing your company network online securely. It is a well- known fact that the Internet is a public network and every single message you exchange with the server can potentially be intercepted by attackers. You need to analyse in detail to address the technologies and techniques that can be used to prevent attackers from modifying the communication between you and web server in addition to keeping your passwords and other details safe.
A. Literature Review:
Research about the different methods for securing the transfer of information across internet service provider. This should include the following:
Part 1. You need to explain the significance of VPN for contemporary organisations. This should cover the different encryption protocols for VPN implementation, including a comparison of SSL/VPN and IPSEC/VPN.
Part 2. IPsec uses the Internet Key Exchange (IKE) protocol to negotiate and establish secured site- to-site or remote-access VPN tunnels. Investigate how Cisco Adaptive Security Appliances (ASA 5500 Series) would support IPsec and IKE.
Part 3. Discuss the role of VPN in supporting the security of businesses, and describe the advantages of SSL/VPN over IPSEC/VPN
Part 4. The rapid proliferation of mobile devices increases on a daily basis, investigate how Cisco
AnyConnect is designed to secure the connections from these mobile devices.
You are also required to address the following topics and task in details:
B. Authentication and Access Control
You need to visit a particular web site and discuss the following points:
Q1. Analyse and write report on how the browser ensures that it is communicating to the right server. Visit a website and add screenshots also highlighting the related part. Explain how SSL and TLS provide authentication?
Q2. Describe how digital signatures work and what role it plays in the authentication process, add the relevant screenshot from your web browser showing the details of signature. What happens during certificate verification?
Q3. Analyse and comment on how the server make sure that it is communicating to the right client, discuss several methods; e.g. if you are using MIT Moodle, how the server verifies that it's actually YOU?
C. Confidentiality and Integrity
Q1. Analyse and write a report on how the confidentiality and integrity is achieved in SSL communication, and how server & client agree on one cipher suit?
Q2. Explain what is the role of symmetric encryption and hash algorithms in SSL communication. Add/take screenshots from your browser showing symmetric encryption and hash details.
Q3. Describe the VPN client software options.
D. Anti-Replay
Q1. Analyse and write a report on how the anti-replay attacks are mitigated in SSL communication.
Q2. How to protect your organization against SSL attacks?
E. Remote Access to database server
Q1. Analyse and comment on how to access your content remotely, in your company database server.
Q2. Explain what possible attacks you might face.
Attachment:- TLS VPN Technologies.zip
ITDB101 Introduction to Database Assignment
: ITDB101 Introduction to Database Assignment Help and Solution, Shinas College of Technology, Oman. Design an EER diagram for a HOTEL Management System
|
EG7034 Mental Wealth Assignment
: EG7034 Mental Wealth, Engineering Management and Project Organisation Assignment help and solution, University of east London - assessment writing service
|
ITSE3101 - Data Structures and Algorithms Assignment
: ITSE3101/ITSE205 - Data Structures and Algorithms Assignment Help and Solution, Higher College of Technology, Oman. Apply Quick sort and Radix sort on arrays
|
Question - Historical Simulation and VaR
: Question 1 - Historical Simulation and VaR. Compute the daily profit of the trader (simply multiply each daily position by the log-return over the next day)
|
BN305 Virtual Private Networks Assignment
: BN305 Virtual Private Networks Assignment help and solution, Melbourne Institute of Technology - assessment writing service – SSL/TLS VPN Technologies
|
BUS 600 Management Communications with Technology Tools
: BUS 600 Management Communications with Technology Tools Assignment Help and Solution - Ashford University, USA. Explain effective communication norms
|
BN303 Wireless Network and Security Assignment
: BN303 Wireless Network & Security Assignment help and solution, Melbourne Institute of Technology - assessment writing service
|
Descriptive Statistics Assignment
: Descriptive Statistics - In this assignment, you will be required to calculate descriptive statistics for each numeric variable in the Heart Rate Dataset
|
Prepare a paper on transformational leadership
: Prepare a paper on Transformational Leadership: Theory, Research, And Application To Sports
|