MN610 Virtual Private Networks Assignment

Assignment Help Other Engineering
Reference no: EM132487626

MN610 Virtual Private Networks Assignment - Melbourne Institute of Technology, Australia

Assessment Title - VPN Technologies and Security issues

Unit Learning Outcomes -

a. Analyse and discuss the significance of VPN for contemporary organisations and how it addresses their concerns and security issues.

b. Explain the role of VPN, its limitations and works done to address these limitations as well as to supporting the security of businesses and corporations.

Assignment Description -

Tasks - There are two parts to this assignment, i.e. part A and part B.

A. Write a review article for the following topics.

B. Presentation (to present in 8-10 slides only in 6-8 minutes during Laboratory time). Students should understand the work presented in part A and they should base their presentation based on their report in part A.

Part A description:

1. Topic 1 - Establishing Cloud Computing Security with VPN

Cloud storage is a service model in which data is maintained, managed, backed up remotely and made available to users over a network or internet. It permits the client to store files online so that the user can access them from any location via the internet. The provider company makes them available to the user online by keeping the uploaded files on an external server. A major challenge for cloud computing providers is to deliver sufficient security levels to protect users' data. A lot of research has been carried out with this target.

Discuss how to secure connectivity to public cloud networks with VPN with different scenarios.

Evaluate public cloud performance considering varying security schemes of firewalls and VPNs under the four scenarios: no firewall no VPN, firewall-only, VPN-only and a combination of firewall and VPN. Investigate the impacts of using VPN together with firewall on cloud computing performance.

Address the issue(s) of VPN security in details as described in common part section.

2. Topic 2 - Secure remote access approaches and VPN Replacement Technologies

Secure remote access is a method of monitoring which combines a hardware and software system to simplify remote network access. Discuss about their similarity and compare secure remote access approaches with VPN from the security standpoint.

Legacy VPNs has had some major drawbacks and problems such as the ones described below. There have been attempts to resolve the issues, and some technologies are being deployed as alternatives, e.g. Microsoft DirectAccess, SoftEther VPN etc. Discuss the limitations/problems existed in legacy VPNs and recommend alternative options to resolve and overcome the problems of legacy VPNs. Address the issue of VPN security in details as described in common part section.

Common Part - VPN Security Issues

Fundamentally, VPN is known as being secure and safe; however, there are still many issues with regards to security aspects. A simple Google search of 'VPN security' displays 135 million results. Search the internet for relevant articles/papers, and compare and analyze what these security issues are and what solutions they propose.

Complete the assignment (minimum 5 and maximum 8 pages) including all the sections below -

1. Title (maximum 15 words)

2. Abstract (200 - 250 words)

3. Introduction (300 - 500 words)

4. Literature Review (500 - 1000 words)

5. Main body (500 - 100 words)

6. Conclusion (200 - 300 words)

7. Future Works (150 - 300 words)

8. References (minimum 10 references)

Contents must include:

History and background of the topic.

What are the challenges and drawbacks, what solutions and workouts they found?

Possible options (solutions) and future research areas proposed.

Scopes of topic, progress of developments such as requirements, benchmarking, purposes & objectives, stakeholders, owners, roles and responsibilities where applicable.

Flowchart

Include a minimum of two (2) figures to show the overall concept and summarized overview of the topic from the review of minimum 10 - 15 (but not limited to) papers.

Include a couple of tables to summarize the result of findings.

How each organization approaches, initiates, develops procedures and ownerships, and what results they got, and how it affected their businesses.

What you conclude in terms of the topic/solutions to implement in an organization. Consider other aspects to include for a good review paper.

Part B description:

Prepare slides (between 8 - 10 slides) for presentation during the lab class.

Attachment:- Virtual Private Networks Assignment File.rar

Reference no: EM132487626

Questions Cloud

What is noncontrolling interest share of scenic net income : what is the noncontrolling interest's share of Scenic's net income. Assume that no intra-entity inventory or land sales occurred between Placid Lake and Scenic
What worksheet entries are made for a december : What worksheet entries are made for a December 31, 2018, consolidation of these two companies to eliminate the impact of the intra-entity transfer?
Making a connection between hard work and success : Policy makers who are interested in making a connection between hard work and success in life would find some supporting intellectual ideas in the work
Study and understand bureaucracy : Contemporary sociologists interested in the concept ideal type and how it can be used to study and understand bureaucracy would gain helpful insights
MN610 Virtual Private Networks Assignment : MN610 Virtual Private Networks Assignment Help and Solution - Melbourne Institute of Technology, Australia. Title - VPN Technologies and Security issues
What is consolidated net income for placid lake : What is consolidated net income for Placid Lake and its subsidiary? Placid Lake Corporation acquired 70 percent of the outstanding voting
Describe some of the major world religions : Describe some of the major world religions. Consider a religion that you are familiar with and discuss some of its beliefs, behaviors, and norms.
Role of communication and negotiation skills in project : BPP 4113 - Project Communication and Negotiation - Role of Communication and Negotiation Skills in Project - What are the communication challenges and barriers
What is the net cost of the goods : What is the net cost of the goods if Glenn Company pays within the discount period? Glenn Company purchased merchandise inventory

Reviews

Write a Review

Other Engineering Questions & Answers

  Identify key concepts and knowledge about contaminants

49116 Contaminated Site and Waste Remediation. Identify key concepts and knowledge about contaminants, subsurface site conditions and site investigation techniques and develop contaminated site conceptual models including water/rock/waste interaction..

  Estimate how much you need to increase the planform area

Estimate how much you need to increase the planform area of the horizontal stabilizer to maintain the same static margin in pitch. Assume for simplicity no change in the cg location.

  Describe the important blood flow parameter

Discuss the Study of blood flow in vascular vessels and flow parameters that relevant for vascular health.Describe the important blood flow parameter

  What is the capacitance of the muscle membrane

What is the capacitance of the muscle membrane - How much charge is separated by this membrane to give a potential of -85 mV?

  Discuss about the big data fraud management

Discuss about the Big data fraud management. Is it possible to implement Alibaba style of fraud management (risk analysis) for US based institutions?

  On the same drawing sketch the distribution of strain

Make a sketch (not to scale) of the deformed shape of a beam subject to a positive bending moment Mx and positive axial load Nx. Make sure your drawing shows the thickness of the beam; i.e., do not idealize the beam by a line.

  Completion of the m.ed. curriculum

Please respond to three of four questions below. Responses should be limited to 150-200 words per question. The statement should be prepared in an MS Word (.doc), Rich Text (.rtf), Portable Document Format (.pdf), or Text (.txt) file format.

  Explain in light of the value of alaska resources

Do you think either amount would purchase Alaska in 2010? Explain in light of the value of Alaska's resources or perhaps the price per acre of land.

  Write an arduino sketch to read the setting of potentiometer

Write an Arduino sketch to read the setting of the potentiometer and use it to control the brightness of the LED. This way, you should be able to interactively control the brightness.

  How market basket analysis is used by companies

Please provide an example of how market basket analysis is used by companies. What is the value of it? How does it relate to Big Data?(300 words)

  Find midband gain am and an estimate of 3-db frequency fh

A common-emitter amplifier has Cπ = 10 pF, Cμ = 0.3 pF, CL = 3 pF, gm = 40 mA/V, β = 100, rx = 100Ω, R1L = 5 kΩ, and Rsig = 1 kΩ. Find the midband gain AM and an estimate of the 3-dB frequency fH using the Miller approximation. Also, obtain anothe..

  Theoretical maximum and minimum values

Sketch the following waveforms, and include the theoretical maximum and minimum values of each waveform:

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd