Address the issue of VPN security

Assignment Help Computer Networking
Reference no: EM132205822

Assignment - VPN Technologies and Security issues

Learning Outcomes

Students should be able to demonstrate their achievements in the following unit learning outcomes:

a. Analyse and discuss the significance of VPN for contemporary organisations and how it addresses their concerns and security issues.
b.Explain the role of VPN, its limitations and works done to address these limitations as well as to supporting the security of businesses and corporations

Assignment Description

Tasks:

There are two parts to this assignment, i.e. part A and part B.

A. Write a review article for the following topics depending on the last digit of your ID: select Topic 1 if it ends in an ‘odd' number or Topic 2 if it ends in an ‘even' number.
B. Presentation

Part A description:

Topic 1 - Significance of VPN for contemporary organisations that have branches nationally and internationally

A virtual private network uses a public network's infrastructure to make the connections among geographicallydispersed nodes, instead of using cables owned or leased exclusively for one single network's use, eg using of network that as is typical for a wide area network (WAN). To the user, a VPN looks like a private network, even thoughit shares the network with other users. There are several uses for a VPN. Analyse and discuss the significance of VPN for these contemporary organisations. List the concerns of contemporary organizations in communicating among their employees and clients, and comment if VPN can address their concerns. Discuss how VPN can be advantageous for securing computer communications. Address the issue of VPN security in details as described in section 3.

2. Topic 2 - VPN Replacement Technologies
Legacy VPNshashad some major drawbacks and problems such as the ones described below. There have been attempts to resolve the issues, and some technologies are being deployed as alternatives, e.g. Microsoft DirectAccess, SoftEther VPN etc. List the limitations/problems existed in legacy VPNs and review alternative options to resolve and overcome the problems of legacy VPNs. Address the issue of VPN security in details as described in section 3.

Common Part- VPN Security Issues
Fundamentally, VPN is known as being secure and safe; however, there are still many issues with regards to security aspects. A simple Google search of ‘VPN security' displays 135 million results. Search the internet for relevant articles/papers, and compare and analyze what these security issues are and what solutions they propose.

Instructions:
Prepare your article as below
1. Go to the IEEE website and download the WORD template for the format.

3. Read and familiarize yourself with the instructions carefully.

4. Prepare a paper using the IEEE format and the example attached. Follow the template if there are any confusions. Also, refer to the link below to have ideas how to start (see section 6).

5. Complete the assignment (minimum 5 and maximum 8 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.
- Title (maximum 15 words)
- Abstract (200 - 250 words)
- Introduction (500 - 1000 words)
- Literature Review (500 - 1000 words)
- Main body (1000 - 1500 words)
- Conclusion (200 - 300 words)
- Future Works (150 - 300 words)
- References (minimum 10 references)
6. The article must be a ‘Review' article including at least 5 references and not more than 25.
7. Strictly follow the IEEE reference format for in-body citations and the references section.
8. See the attached files for guidance on how to prepare a review paper. You can also find thorough instructions from IEEE and the Internet.
9. Contents must include:
- History and background of the topic
- What are the challenges and drawbacks, what solutions and workouts they found
- Possible options (solutions) and future research areas proposed
- Scopes of topic, progress of developments such as requirements, benchmarking, purposes & objectives, stakeholders, owners, roles and responsibilities where applicable.
- Flowchart
- Include a minimum of two (2) figures to show the overall concept and summarized overview of the topic from the review of minimum 10 - 15 (but not limited to) papers.
- Include a couple of tables to summarize the result of findings
- How each organization approaches, initiates, develops procedures and ownerships, and what results they got, and how it affected their businesses.
- What you conclude in terms of the topic/solutions to implement in an organization. Consider other aspects to include for a good review paper.

Attachment:- Assessment.rar

Verified Expert

The paper has analysed the usage and limitations of legacy VPNs. It has also shown the usage of alternative VPNs that are opted by different organisations to a great extent. Apart from this, the paper has shown the connectivity of VPN via a flowchart.

Reference no: EM132205822

Questions Cloud

Theory of formative and summative evaluation : Compare and contrast the theory of Formative and Summative Evaluation. Explain in detail the purpose for and how evaluations are commissioned.
Should lexmark launch this new product : Lexmark currently makes four different models of inkjet printers. Should Lexmark launch this new product?
Creating and implementing MACS system : Find an organization with which you are familiar and explain the primary considerations for creating and implementing a MACS system for that company.
Describe the type of information stored in each : As the number of objects linking an individual to a crime scene increases, so does the likelihood of that individual's involvement with the crime.
Address the issue of VPN security : Explain the role of VPN, its limitations and works done to address these limitations as well as to supporting the security of businesses and corporations
Describe the four primary manufacturing strategies : Describe the four primary manufacturing strategies. How does each other affect delivery lead time?
Communication problem amongst employees : Why is there always a communication problem amongst employees and managers along with managers knowing how to be approachable,
Why some diaspora populations are at risk of radicalization : Identify, describe, and examine the issue of radicalization. Review RAND Corporation's Conference Study on radicalization of diaspora risk populations.
Organizations do to effectively manage diversity : What can individuals, leaders, and organizations do to effectively manage diversity? Provide an example with your response.

Reviews

len2205822

1/2/2019 2:24:53 AM

Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using APA or IEEE referencing style for School of Business and School of Information Technology and Engineering respectively.

len2205822

1/2/2019 2:17:17 AM

Identification and Analysis /8 Identified the security and privacy issues and provided excellent justification Identified the security and privacy issues and provided good justification Identified the security and privacy issues and provided valid justification Identified the security and privacy issues and failed to provide valid justification Failed, to identify the security and privacy issues Propose /5 Exceptional proposal of communication technologies for IoT Good proposal of communicat ion technologies for IoT Balanced proposal of communication technologies for IoT Acceptable proposal of communication technologies for IoT Failed to propose communication technologies for IoT Conclusion /4 Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors

len2205822

1/2/2019 2:17:11 AM

Comparison /12 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available Evaluation /8 Exceptional evaluation of network performance Very good evaluation of network performanc e Good evaluation of network performance Adequate evaluation of network performance Poor understanding of network performance

len2205822

1/2/2019 2:17:06 AM

Grade Mark HD 40 – 50 DI 35 – 39 CR 30 – 34 P 25 – 30 Fail <25 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /4 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Report Layout /5 Exceptional report layout, style and language used Very good report layout, style and language used Good report layout, style and language used Acceptable report layout, style and language used. Poor report layout, style and language used.

len2205822

1/2/2019 2:17:01 AM

Evaluation Evaluate the network performance of the communication technologies for IoT 8 Identification and Analysis Identify and analyse the security and privacy issues in IoT. 8 Propose Propose a communication technology for IoT enabled devices in a home network. 5 Conclusion Write summary of the report 4 Reference style Follow IEEE reference style 4 Total 50

len2205822

1/2/2019 2:16:55 AM

Marking criteria: Section to be included in the report Description of the section Marks Introduction Outline of the report ( in 3-4 sentences) 4 Report Layout Report layout, style and language 5 Comparison Comparison of the existing communication technologies for IoT in terms of: a. Band of Operation b. Modulation techniques c. Data rates d. Nominal range of operation 12

len2205822

1/2/2019 2:16:47 AM

Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  Provide a reference to the article you found

Provide a reference to the article you found. Is there anything missing from the set of barriers in your list? If so, what?

  Sketch a ppp frame and fill in the fields with bits

Sketch a PPP frame and fill in the fields with bits. The information field contains a link layer control message containing two octets which are all ones. The FCS is 01011001 10100111. Make your sketch in a vertical format that is 32 bits wide.

  Define the switch-over from ipv4 to ipv6

Is there a problem with using DHCP but setting up the lease time to "unlimited"? What is the difference between doing it this way and just using Static IP Addressing

  What are the services provided by tcp

Name four socket functions (C functions) used to create client/server applications. Name the five layers in a typical TCP/IP computer network. What are the services provided by TCP

  Analyze how do the teams manage their team boundaries

Consider the different teams presented in your reading assignment. Analyze how do the teams manage their team boundaries?

  Protect information assets in a business sector

Discuss how cryptography is used to protect information assets in a business sector that you work or would like to work.

  How does packet switching use the mac address

How does packet switching use the MAC address? Reference other material that aided you in your understanding

  Explain the networks fundamental characteristics

Explain the network's fundamental characteristics and components. Evaluate the current network topology

  Company in manhattan still keeps to the traditional mailing

A company in Manhattan still keeps to the traditional mailing approaches even though the nature of their business strictly involves confidential documents that need to be sent to clients. Tell this Manhattan company why you think their messages can b..

  What else is needed to replace the pbx

In addition to Internet phone software and the interface in Part b (above) what else is needed to replace the PBX?

  What major risks behind implementing cloud computing program

What are some of the major strategies and risks behind implementing cloud computing programs in today's technology filled world?

  The general method for constructing the parameters of the

the general method for constructing the parameters of the rsa cryptosystem can be described asnbspfollows select two

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd