VPN Replacement Technologies

Assignment Help Computer Network Security
Reference no: EM132293774

Assignment - VPN Technologies and Security issues

Learning Outcomes

Students should be able to demonstrate their achievements in the following unit learning outcomes:

a. Analyse and discuss the significance of VPN for contemporary organisations and how it addresses their concerns and security issues.

b. Explain the role of VPN, its limitations and works done to address these limitations as well as to supporting the security of businesses and corporations

Assignment Description

Tasks:

There are two parts to this assignment, i.e. part A and part B.

A. Write a review article for the following topics depending on the last digit of your ID: select Topic 1 if it ends in an ‘odd' number or Topic 2 if it ends in an ‘even' number. Note that final mark of part A would be affected by the presentation result of part B. This is to assure that students understand the work presented in part A. overall mark of part A could be deducted by 50% for poor presentation.

B. Presentation(to present in 5-8 slides only in 5-8 minutes during Laboratory time)10 marks

Part A description:

Topic 1- VPN Replacement Technologies

Legacy VPNshashad some major drawbacks and problems such as the ones described below. There have been attempts to resolve the issues, and some technologies are being deployed as alternatives, e.g. Microsoft DirectAccess, SoftEther VPN etc. Discussthe limitations/problems existed in legacy VPNs and recommendalternative options to resolve and overcome the problems of legacy VPNs. Address the issue of VPN security in details as described in common part section.

Common Part- VPN Security Issues
Fundamentally, VPN is known as being secure and safe; however, there are still many issues with regards to security aspects. A simple Google search of ‘VPN security' displays 135 million results. Search the internet for relevant articles/papers, and compare and analyze what these security issues are and what solutions they propose.

Instructions:

Prepare your article as below

1. Go to the IEEE website and download the WORD template for the format.

2. See the link for the template(attached)

3. Read and familiarize yourself with the instructions carefully.

4. Prepare a paper using the IEEE format and the example attached. Follow the template if there are any confusions. Also, refer to the link below to have ideas how to start (see section 6).

5. Complete the assignment (minimum 5 and maximum 8 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.
• Title (maximum 15 words)
• Abstract (200 - 250 words)
• Introduction (300 - 500words)
• Literature Review (500 - 1000 words)
• Main body (500 - 100 words)
• Conclusion (200 - 300 words)
• Future Works (150 - 300 words)
• References (minimum 10 references)

6. The article must be a ‘Review' article including at least 5 references and not more than 25.

7. Strictly follow the IEEE reference format for in-body citations and the references section.

8. See the attached files for guidance on how to prepare a review paper. You can also find thorough instructions from IEEE and the Internet.

9. Contents must include:
• History and background of the topic
• What are the challenges and drawbacks, what solutions and workouts they found
• Possible options (solutions) and future research areas proposed
• Scopes of topic, progress of developments such as requirements, benchmarking, purposes & objectives, stakeholders, owners, roles and responsibilities where applicable.
• Flowchart
• Include a minimum of two (2) figures to show the overall concept and summarized overview of the topic from the review of minimum 10 - 15 (but not limited to) papers.
• Include a couple of tables to summarize the result of findings
• How each organization approaches, initiates, develops procedures and ownerships, and what results they got, and how it affected their businesses.
• What you conclude in terms of the topic/solutions to implement in an organization. Consider other aspects to include for a good review paper.

10. Remember to strictly follow the template and the instructions above to avoid penalties.

Part B description:

Prepare slides (between 5 - 10 slides) for presentation during the lab class. Read the instruction attached carefully.

Attachment:- VPN Technologies and Security issues.rar

Verified Expert

The assignment was all about VPN i have looked at all the points that the assignment required and referenced using the appropriate reference styles given by the professor.

Reference no: EM132293774

Questions Cloud

Analyze best practices and expectations for accountability : Analyze best practices and expectations for accountability in human resource management and talent development in health care organizations.
Quest for sustainable competitive advantage : What is the connection between a company's strategy and its quest for sustainable competitive advantage? Explain this in terms of the following 2 companies:
Calculate the return on equity using the dupont system : In order to be successful, companies must leverage their spending in ways that will add to their value and propel them in the marketplace. In this portion.
How and when should an educational organization redesign : How and when should an educational organization redesign their curriculum?
VPN Replacement Technologies : MN610 - Virtual Private Networks - Melbourne institute of technology - Explain the role of VPN, its limitations and works done to address these limitations
How does morality play a part in the actions taken : Do any of the traits exhibited result from an ethical point of view? How does morality play a part in the actions taken?
Describe the different approach to death : Choose one modern religion and one ancient religion and describe their different approach to death. then, discuss the ways in which their attitudes, rituals.
What effect might it have had on non-critical thinkers : Select a news or public affairs program on television or the Internet to watch. Watch the program listening for logical fallicies.
Compute dollars of ticket sales needed to earn target profit : Calculate the dollars of ticket sales needed to earn a target profit of $6,000. Calculate the dollars of ticket sales needed to earn a target profit of $12,000.

Reviews

len2293774

4/26/2019 1:00:17 AM

Marking Rubric Criteria/ Grades High Distinction (HD) [Excellent] >80% Criteria 1 Concise and specific to the project Criteria 2 Demonstrated excellent ability to think critically and sourced reference material appropriately Criteria 3 Demonstrated excellent ability to think critically and sourced reference material appropriately Criteria 4 All elements are present and very well integrated. Criteria 5 Logic is clear and easy to follow with strong arguments Criteria 6 Clear styles with excellent source of references.

len2293774

4/26/2019 12:59:59 AM

Main sections Main body structures and contents quality including word limit. 40 Literature review Severe penalties apply for simple listing and describing. It should be a logically support analysis that reaches the review conclusion that should be included at the end of the section. Check word limit. 10 In body citation Strictly follow the order and instruction by IEEE. Check when/where to put the citation. See attached files and search the internet for guidelines 5 References section Check whether they follow the instruction. Otherwise, no marks will be provided 5 Presentation Presentation skills and materials quality 10 Total 100

len2293774

4/26/2019 12:59:53 AM

Marking criteria: Example of marking criteria is shown in following table. Marks are allocated as follows: Note: The marking criteria varies for each assignment Section to be included in the report Detailed Description of the Criteria Marks Conforming to the template and format No marks will be given and severe penalties will apply for any breach of the format and template. Fonts, sizes, spacing, captions, headings etc. will also be checked thoroughly. Be thorough and follow fully when using the template and format instruction to avoid penalties. 10 Figures and tables created They should be created yourself and not copied from elsewhere. For full marks you should create at least 2 figures and 2 tables. 20

len2293774

4/26/2019 12:59:43 AM

Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using APA or IEEE referencing style for School of Business and School of Information Technology and Engineering respectively.

Write a Review

Computer Network Security Questions & Answers

  Case study - forced decryption ruled unconstitutional

Evaluate the effect of this ruling on forensic investigations from a forensics standpoint and determine whether or not you would consider this an "open door" for criminal activity.

  Assignment on securing the scene

Imagine you are a digital forensic investigator for a healthcare organization. You learn from your internal information security department that an employee has been using password-cracking software to access confidential customer insurance inform..

  Describe the packet-filtering router firewall system

Describe the Packet-filtering router firewall system, Screened host firewall system and Screened-Subnet firewall system.

  Generates alternative message that has hash value

Generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash."

  Provide an overview of new web-based organization plans

Provide an overview of the new Web-based or Internet network the organization plans to implement. Prepare an overview of the security requirements for the network.

  What effect is produced on the recovered plaintext blocks

Suppose an error occurs in a block of ciphertext on transmission using CBC. What effect is produced on the recovered plaintext blocks?

  Security plan for the network

Utilizing the security mechanisms you have learned design the security plan for the network according to the project manager's requirements

  Reliable transmission of large volume data

Modern network applications require reliable transmission of large volume of data with bounded delay, between users and data-centres and between data-centres, potentially half way around the earth. What are the limitations in using distributed data c..

  What is the present value of the 360 rental payments

Assuming the annually compounded interest rate is 12% /year, what is the present value of the 360 rental payments.

  Discuss the role they play in computer crime

Discussing the role they play in computer crime. Be sure to research and document cases to support each law and your discussion

  Does crc detect more errors than a parity bit

Does CRC detect more errors than a parity bit? Why or Why not? A world wide web server typically receives small messages from clients but sends very large messages back to them. What type of ARQ protocol would be best suited?

  Ientify another application other than course management

security change management and architectural adaptationthe online course management system from previous assignments is

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd