Microsoft Word - BN305-Assignment 1_T1_2021_v1.0.docx Preparedby:DrSanjeebShrestha Moderatedby:DrAmmarAlazab March,2021 AssessmentDetailsandSubmissionGuidelines UnitCode BN305–T12021...

1 answer below »
BN305


Microsoft Word - BN305-Assignment 1_T1_2021_v1.0.docx Preparedby:DrSanjeebShrestha Moderatedby:DrAmmarAlazab March,2021 AssessmentDetailsandSubmissionGuidelines UnitCode BN305–T12021 UnitTitle VirtualPrivateNetworks AssessmentType IndividualAssignment AssessmentTitle Assignment1–VPNApplicationsandSignificance Purpose of the assessment (with ULOMapping) ThepurposeofthisassignmentistoreviewexistingliteraturesonimportantVPN technologiesandissuesandwriteareport. a. ExplainthesignificanceofVPNforcontemporaryorganisations b. DiscusstheroleofVPNtosupportthesecurityofbusinesses Weight Assignment1a5% Assignment1b10% TotalMarks 100 Wordlimit 500–700words(forassignment1a)700–800words(forassignment1b) DueDate Assignment1a-Week3,11:59PM,11April2021 Assignment1b-Week7,11:59PM,06May2021 Submission Guidelines • SubmitAssignment1ainaworddocumentinweek3andAssignment1binweek 7. • AllworkmustbesubmittedonMoodlebytheduedatealongwithacompleted AssignmentCoverPage. • Theassignmentmustbe inMSWord format,1.5spacing,11-ptCalibri (Body) fontand2cmmarginsonall foursidesofyourpagewithappropriatesection headings.MakesurethatallthescreenshotssubmittedonMoodlemustcarry youruniqueidsuchasMITID,namesetc. • Referencesourcesmustbecitedinthetextofthereportandlistedappropriately attheendinareferencelistusingIEEEreferencingstyle. Extension If an extension of time to submit work is required, a Special Consideration Application must be submitted directly through AMS. You must submit this applicationwithinthreeworkingdaysoftheassessmentduedate.Further informationisavailableat: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/specialconsiderationdeferment Academic Misconduct AcademicMisconductisaseriousoffence.Dependingontheseriousnessofthe case,penaltiescanvaryfromawrittenwarningorzeromarkstoexclusionfrom thecourseorrescindingthedegree.Studentsshouldmakethemselvesfamiliar withthefullpolicyandprocedureavailableat:http://www.mit.edu.au/about- mit/institute-publications/policies-procedures-and-guidelines/Plagiarism- Academic-Misconduct-Policy-Procedure.Forfurtherinformation,pleasereferto theAcademicIntegrity BN305 Page 3 of 5 Preparedby:DrSanjeebShrestha Moderatedby:DrAmmarAlazab March,2021 Assignment1a(LiteratureReview): Task1-Researchonatleast5differentuse-cases(forexample;Hospitality,Banking,Defense,etc.)of VPNimplementationintheindustryandcriticallyanalysea)theneed,b)robustnessandc)significance ofVPN. • YouneedtoexplainthesignificanceofVPNforcontemporaryorganizations.Hint:Itis goodtohavedifferentencryptionprotocolsforVPNimplementation,e.g., comparisonofSSL/VPN,IPSEC/VPN,L2VPN,etc. Task2-DiscusswhetheralternativetechnologiestoVPNexistswhichwouldbenefityourchosen industries. • YouneedtoresearchwhetherthereisanysubstituteforVPN.Compareandcontrast any3ofthem,ifyouthinkthattheyexist. Assignment1b Task3-FeedbackfromAssignment1a ItismandatorytoincludeandreflectonthefeedbackforAssignment1a. Task4-Protocolandscenarioanalysis a) Compareandcontrastlayer2andlayer3VPNprotocolswiththeircharacterstics. b) DiscussascenariowhereyouthinkVPNtransportmodesissuitable.Illustratetheframeformatinyour explanation. Task5-ProcessandProcedues a) IllustratethecomponentsthatarerequiredinPhase1IKEv1. b) ExplaintheDiffie-Hellman(DH)keyexchangeanditsverlernabilitytotheMan-in-the-Middleattack. c) CritiqueontheusageofInternetKeyExchangev2(IKEv2).IllustratehowIKEv2workswithanappropriate diagram. BN305 Page 4 of 5 Preparedby:DrSanjeebShrestha Moderatedby:DrAmmarAlazab March,2021 MarkingCriteria Questions Description Marks Assignment1a Task1-Researchonatleast5different use-casesofVPNimplementationin industryandcriticallyanalysea)the need,b)robustnessandc)significance ofVPN. YouneedtoexplainthesignificanceofVPNfor contemporaryorganizations.Hint:Itisgoodto havedifferentencryptionprotocolsforVPN implementation,includingacomparisonof SSL/VPNandIPSEC/VPN. 5+5+5=15 Task2-Discusswhetheralternative technologiestoVPNexistswhich wouldbenefityourchosenindustries. Youneedtoresearchwhetherthereisany substituteforVPN.Compareandcontrastany3 ofthem,ifyouthinkthattheyexist. 5+5+5=15 Assignment1b Task-3Feedbackfromassignment1a Studentsshouldincludethefeedbackreceived forassignment1aandclearlymentionhowisit incorporatedformakingassignment1bbetter. 10 Task4-Protocolandscenarioanalysis CompareandcontrastdifferentVPN protocolswiththeircharacterstics. Discussthescenariowhereyouthink VPNtunnelandtransportmodesare suitable.Illustratetheframeformatin yourexplanation. StudentsmaytakeprotocolssuchasPPTP,L2TP, L2F,IPSecetc. Studentsshouldclearlyexplainthescenarioand provethevalidityofthemodesadapted. 10 10 Task5-ProcessandProcedues Illustratewithanappropriatediagram theInternetSecurityAssociationand KeyManagementProtocol(ISAKMP) processforSecurityAssociation(SA) withpeers. ExplaintheDiffie-Hellman(DH)key exchangeanditsverlernabilitytothe Man-in-the-Middleattack. CritiqueontheusageofInternetKey Exchangev2(IKEv2).Illustratehow IKEv2workswithanappropriate diagram. Studentsshouldclearlyexplaintheprocesswith appropriatediagram. Studentsshouldclearlyexplaintheprocesswith appropriatediagram. Studentsshouldclearlyexplaintheprocesswith appropriatediagram. 10 15 10 BN305 Page 5 of 5 Preparedby:DrSanjeebShrestha Moderatedby:DrAmmarAlazab March,2021 References FollowIEEEreferencestyleandusereferences fromtrustworthysources. 5 Total 100 BN305 Page 5 of 5 Preparedby:DrSanjeebShrestha Moderatedby:DrAmmarAlazab March,2021 MarkingRubric HD>80% D=70-79% C=60-69% P=50-59% F<50% sections excellent verygood good fair poor literature review task1 highly appropriate andclear appropriate andclear somewhat appropriate andclear somewhat appropriat eand somewhat clear not appropriate andnot clear literature review task2 allelements arepresent andhighly valid allelements arepresent andvalid somewhat elementsare presentand valid eithersome ofthe elements aremissed orafewof the elements are invalid. lacks elementsand generally invalid task3-feedback fromassignment 1b excellent incorpotatio nand excellent reflection verygood incorpotatio andvery good reflection good incorpotation andgood reflection fair incorpotati onandfair reflection lacks incorpotation andlacks reflection task4-protocol andscenario analysis highly appropriate andclear appropriate andclear somewhat appropriate andclear somewhat appropriat eand somewhat clear not appropriate andnot clear task5-process andprocedues allelements arepresent andhighly valid allelements are present and valid somewhat elementsare presentand valid eithersome ofthe elements aremissed orafewof the elements are invalid. lacks elementsand generally invalid sections="" excellent="" very="" good="" good="" fair="" poor="" literature="" review="" task="" 1="" highly="" appropriate="" and="" clear="" appropriate="" and="" clear="" somewhat="" appropriate="" and="" clear="" somewhat="" appropriat="" e="" and="" somewhat="" clear="" not="" appropriate="" and="" not="" clear="" literature="" review="" task="" 2="" all="" elements="" are="" present="" and="" highly="" valid="" all="" elements="" are="" present="" and="" valid="" somewhat="" elements="" are="" present="" and="" valid="" either="" some="" of="" the="" elements="" are="" missed="" or="" a="" few="" of="" the="" elements="" are="" invalid.="" lacks="" elements="" and="" generally="" invalid="" task="" 3-="" feedback="" from="" assignment="" 1b="" excellent="" incorpotatio="" n="" and="" excellent="" reflection="" very="" good="" incorpotatio="" and="" very="" good="" reflection="" good="" incorpotation="" and="" good="" reflection="" fair="" incorpotati="" on="" and="" fair="" reflection="" lacks="" incorpotation="" and="" lacks="" reflection="" task="" 4="" -="" protocol="" and="" scenario="" analysis="" highly="" appropriate="" and="" clear="" appropriate="" and="" clear="" somewhat="" appropriate="" and="" clear="" somewhat="" appropriat="" e="" and="" somewhat="" clear="" not="" appropriate="" and="" not="" clear="" task="" 5="" -="" process="" and="" procedues="" all="" elements="" are="" present="" and="" highly="" valid="" all="" elements="" are="" present="" and="" valid="" somewhat="" elements="" are="" present="" and="" valid="" either="" some="" of="" the="" elements="" are="" missed="" or="" a="" few="" of="" the="" elements="" are="" invalid.="" lacks="" elements="" and="" generally="">
Answered 2 days AfterApr 08, 2021

Answer To: Microsoft Word - BN305-Assignment 1_T1_2021_v1.0.docx Preparedby:DrSanjeebShrestha...

Rachna answered on Apr 10 2021
136 Votes
A VPN or Virtual Private Network is a tool that grants a safe and secure access to the internet. It starts with encrypting your data before connecting to the web. The data then proceeds to a VPN server, changes your IP address and location (if desired). This updated information is then fed to the online destination. The person who receives this data will not be able to see the source of the data. It is a great tool to protect privacy and stay secure while browsing online.
Let us consider a few cases where VPN can be used to make life easier:
1. Online Banking
In the current times, when online transactions are a major mode of payment across businesses globally, it is crucial that we take utmost care while making these transactions. It could be your money, employees’ salaries or business payments! Using a VPN will keep the data encrypted during these transactions, thus keeping it safe from hackers. In these times, it is important that we always use VPNs for online banking or other transactions.
2. Defense/Military
VPNs used for military communication purposes need to meet much higher requirements than general VPNs. To adhere to the robustness of the requirements, certain certifications are necessary for military grade VPNs. Both hardware and software VPNs are a good fit for secure military communications. Communication network is also an essential factor to consider while choosing an appropriate VPN for military communication.
3. Hospitality/Traveling
It is not a surprise that while traveling and staying in hotels, we tend to come across hotel WiFi or other public WiFi that might not be secure, hence retrieving sensitive data. Using a VPN encrypts the data between the device and the internet, making the internet usage much safer. While it is tempting to use FREE and high speed WiFi, it is a wiser decision to use it with a VPN for safety and security.
4. Online Shopping
Using a VPN while online shopping is a great idea to avoid country specific sites while traveling abroad. It is also useful while booking flight tickets since the IP address is encrypted and the website cannot get your details to hike the price depending on your searches.
5. Geo Blocking
Sometimes internet content might be blocked due to a user’s location. One might travel abroad and find out that TV show/movie website is blocked outside of the home country. In such cases VPN servers can solve this issue and allow the streaming of your favourite shows without any issues.
VPNs are great     for privacy protection and enhanced internet security. A VPN provides an encrypted tunnel for data transmission between the user and the company network. This data can not be read by any third party since it is encrypted and well secured. VPNs protect users from various cyber attacks such as identity theft, or data theft. A VPN hides your IP address, location, browsing history, your web activity and devices, hence enhancing your data security.
There are various encryption protocols for VPN implementation. Let us discuss a few:
SSL/VPN:
It is a secure socket layer VPN that enables users to gain access to an organization’s network, applications and directories without using any software. SSL VPNs are crucial to provide connectivity to employees for the work applications they require and for IT so that only authorized users receive access. SSL VPNs provide safe and secure communication through encrypted connection for every type of device regardless of the type of network.
IPSEC/VPN:
When a number of protocols are grouped together to form encrypted...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here