Evaluation of WAN Security Issues and Performance

Verified

Added on  2023/04/22

|13
|776
|241
Presentation
AI Summary
This study aims to evaluate WAN security issues and performance, exploring WAN security policies, strategies, and ways to overcome security issues. The study also identifies the significance and scope of WAN technologies and principles of implementation. The research questions focus on WAN concepts, security policies, and strategies for effective security measures. The study finds that WAN technologies can capture multiple distance areas and share resources among different branches of companies. However, WAN security issues include vulnerability, eavesdropping, falsification, and unauthorized use. The study recommends data encryption, callback systems, public- and private-key security, and network operating systems with built-in security features as security measures. The implementation plan includes primary and secondary data collection, data analysis, and future research. At the end of this study, the researcher would be able to understand the wide area network security policies and guidelines to overcome security related issues.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Evaluation of the WAN security issues
and performance
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction
The purpose of study is to identify security and
performance measurement associates with Dynamic
Multipoint Virtual Private Network (DMVN).
With help of this research, investigator will be able to
measure impact of security factor on organizations and
users who are using WAN technologies in their day to
day business operations.
Document Page
Aim and objectives
Aim
The main aim of the study is to evaluate WAN security issues and
performance.
Objectives:
To understand WAN concept and principles of its implementation
To explore the wide area network security issues and policies to
overcome security
related issues
To develop and implement WAN security strategy with considering
effective security
measure
To evaluate the ways and strategies in order to overcome WAN
security issues
Document Page
Research questions
What is WAN concept and basic terminology of wide area
network regarding its implementation at large geographical area?
How wide area network security policies and guidelines can
help companies in reducing security related issues?
How WAN security strategies can be implemented for effective
security measure of network?
What are the main strategies and ways through which wide area
network related issues can be solved in a proper manner?
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Significance and scope of study
Understanding WAN technologies and principles of wide area
network implementation
Increasing awareness about Security measures and wide area
network security policies
Investigating strategies required for reducing issues associated
with the use of wide area network technologies
Document Page
Key findings from the literature
WAN capability
Capture multiple distance areas
Share resources among different branches of companies
Dynamic Multipoint Virtual Private Network(DMVN)
Establish fast moving of digital communications among different
branches
A full meshed connection between multiple sites (Anees and
Zeilinger, 2014).
Document Page
Key findings from the literature
Security issues:
The vulnerability of a WAN
Capture, evesdropping, falsification issues
Attack specific qualitative levels of information (Johnson, 2011).
Unauthorized use, information theft, and malicious damage to
files
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Key findings from the literature
Security measures
Data encryption
Callback systems
Public- and private-key security
Network operating systems with built-in
security features
Document Page
Requirement analysis [Prototyping model]
Requirement identification
Understanding of WAN concepts
Security issues associated with WAN technologies
Discuss main strategies and ways through which wide area network
related issues
Develop initial prototype
Conducting review of literature
Technical feasibility of project is checked
Secondary and primary data collection related to topic
Actual findings and facts are gathered
Statistical test is applied
Review of prototype
Findings disuses with tutor
Further enhancement
Feedback is collected in an organized manner
Changes accepted and incorporate in research
Document Page
Design specification
Primary data collection
Respondents: HP, Defcon and Cisco IT employees
Sample size: 100
Tool: Statistical software package for social science (SPSS)
Secondary data collection
Literature review [Books, Journals and online published report
on companies]
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Implementation plan
Data collection
Researcher will approach IT companies respondents
To find Security issues associated with WAN technologies and security
measures
Research gap identified
Data analysis Hypothesis is framed
Statistical tool will be applied for data analysis
Recommend and future research
Future research
Limitations of study
Way to overcome limitations
Document Page
Research findings
At the end of this study, researcher would be able to understand
the wide area network security policies and guidelines to
overcome security related issues.
It also helps researcher to measure performance and security
parameter of Dynamic Multipoint Virtual Private Network
(DMVPN).
With help of study, researcher would be able to identify and
overcome security issues associated with WAN.
Document Page
References
Johnson, A., 2011. Greatest security issues to a WAN. [Online]. Available
through:< http://www.business2community.com/tech-gadgets/greatest-
security-risks-to-a-wide-area-network-0110161#fhiVlJR9A6e2jEqB.97>.
[Accessed on:11th December 2015].
Anees, T. and Zeilinger, H., 2014. Performance evaluation of a service
availability model. IEEE.pp. 115-120.
Liang, X., Qin, J. and Wan, J., 2014. An Effective and Secure Epidemic
Routing for Disruption-Tolerant Networks. IEEE. pp. 329-333.
Wan, J., Canedo, A. and Faruque, M. A. A., 2015. Security-Aware Functional
Modeling of Cyber-Physical Systems. ETFA'15.
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]