Explain significance of VPN for contemporary organisations

Assignment Help Computer Network Security
Reference no: EM132359111 , Length: word count:1800

Virtual Private Networks Assignment - SSL/TLS VPN Technologies

Purpose of the assessment (with ULO Mapping) - The purpose of this assignment is to review existing literatures on important VPN technologies and issues and write a report. The report must be specific to the given topics, use appropriate examples and detail of the topic given to develop a review paper. In preparing the assignment, students should acquire not only the knowledge of current technical aspects of VPN but also research, data collection, analysis and writing skills. Students should be able to demonstrate their achievements in the following unit learning outcomes:

a. Explain the significance of VPN for contemporary organisations.

b. Discuss the role of VPN to support the security of businesses.

Assignment Questions:

Objective: Your tasks are to analyse and to write a report about the processes and the security technologies being used when you access any website (which uses HTTPS) online via a web browser, as well as having the ability to remotely accessing your company network online securely. It is a well-known fact that the Internet is a public network and every single message you exchange with the server can potentially be intercepted by attackers. You need to analyse in detail to address the technologies and techniques that can be used to prevent attackers from modifying the communication between you and web server in addition to keeping your passwords and other details safe.

A. Literature Review: Research about the different methods for securing the transfer of information across internet service provider. This should include the following:

1. You need to explain the significance of VPN for contemporary organisations. This should cover the different encryption protocols for VPN implementation, including a comparison of SSL/VPN and IPSEC/VPN.

2. IPsec uses the Internet Key Exchange (IKE) protocol to negotiate and establish secured site- to-site or remote-access VPN tunnels. Investigate how Cisco Adaptive Security Appliances (ASA 5500 Series) would support IPsec and IKE.

3. Discuss the role of VPN in supporting the security of businesses, and describe the advantages of SSL/VPN over IPSEC/VPN.

4. The rapid proliferation of mobile devices increases on a daily basis, investigate how Cisco AnyConnect is designed to secure the connections from these mobile devices.

You are also required to address the following topics and task in details:

B. Authentication and Access Control - You need to visit a particular web site and discuss the following points:

1. Analyse and write report on how the browser ensures that it is communicating to the right server. Please visit a website and add screenshots also highlighting the related part. How SSL and TLS provide authentication?

2. Describe how digital signatures work and what role pays in the authentication process, add the relevant screenshot from your web browser showing the details of signature. What happens during certificate verification?

3. Analyse and comment on how the server make sure that it is communicating to the right client, discuss several methods; e.g. if you are using MIT Moodle, how the server verifies that it's actually YOU?

C. Confidentiality and Integrity -

1. Analyse and write a report on how the confidentiality and integrity is achieved in SSL communication, and how server & client agree on one cipher suit?

2. Explain what is the role of symmetric encryption and hash algorithms in SSL communication. Add/take screenshots from your browser showing symmetric encryption and hash details.

3. Describe the VPN client software options.

D. Anti-Replay -

1. Analyse and write a report on how the anti-replay attacks are mitigated in SSL communication.

2. How to protect your organization against SSL attacks?

E. Remote Access to database server -

1. Analyse and comment on how to remotely access your content at you your company database server.

2. Explain what possible attacks you might face.

Reference no: EM132359111

Questions Cloud

Task and resource scheduling : Scheduling Resources and Costs of Project Management. Create a network schedule using the information provided in the exercise, apply resources,
Nano server with your windows 2016 server : Name two or three advantages of using Nano Server with your Windows 2016 Server. What tools are the most important to you to install and manage it?
Strategic importance of cloud computing in business : Research at least two articles on the topic of the strategic importance of cloud computing in business organizations. What information was relevant and why?
Difference between ML-DL and AI : Did you think there was a difference between ML, DL and AI? If yes, explain. If no, also explain. Based on your own field, how would ML, DL or AI be applied.
Explain significance of VPN for contemporary organisations : MIT Australia - BN305 Virtual Private Networks Assignment - SSL/TLS VPN Technologies. Explain the significance of VPN for contemporary organisations
Evaluate sources of data as influences for decision-making : Torrens University - MGT602 Business Decision Analytics Assignment - Research Analysis Report. Evaluate sources of data as influences for decision-making
Conduct research on some initiatives and security measures : Conduct research on some initiatives and security measures that have been taken in the aviation industry
Difference between black hole attack and wormhole attack : Discuss and describe the difference between a black hole attack and a wormhole attack.
Hired the security manager : You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire,

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe the integrative functions

Describe the various integrative functions and processes within the information systems area, including databases, systems analysis, security, networking, computer infrastructure, human computer interaction, and Web design.

  Develop a plan to implement new security devices

Develop a plan to implement new security devices and modify existing security device that are required to monitor the network and the polices that were created.

  role of security and privacy in the EA program

What is your understanding of the role of security and privacy in the EA program and in the Enterprise Architecture itself

  Write an essay about the privacy on the internet

Write an essay about the Privacy on the Internet. Narrow the big topics down to a specific research question and clearly state what it is in the introduction.

  Formulate the network security plan to be implemented

Review the work you have done and formulate the Network Security Plan to be implemented across the network footprint. What is being done to secure the network at different levels of the OSI model and the organizational structure.

  What is cyberstalking

Do you think that they should have used these laws to prosecute Drew - What is cyberstalking? Research the Megan Meier case. Do you agree with the ruling?

  Define cybercrimes and computer security

Evaluate how teamwork and leadership are effective tools for financial forensic investigations. Provide support for your evaluation.

  Decisions on any changes that materially affect project

It has been recommended in some quarters that for large projects, decisions on any changes that materially affect assignment milestones

  Security issues considered when implementing a wireless lan

What type of security issues need to be considered when implementing a Wireless LAN?

  What initial actions should incident response policy specify

What initial actions should the incident response policy specify? What default decision do you recommend regarding reporting this incident to appropriate CERT?

  What is penetration testing?

What is penetration testing?

  What are few security compromises that were faced in past

What are the few security compromises that were faced in the recent past due to lack of internet and e-Commerce security competencies?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd