logo

Assignment | The aim of this report is to analyse and understand the process and features of security of the emerging technologies.

Review existing literatures on VPN technologies and issues and write a report.

14 Pages2762 Words18 Views
   

Added on  2022-09-15

Assignment | The aim of this report is to analyse and understand the process and features of security of the emerging technologies.

Review existing literatures on VPN technologies and issues and write a report.

   Added on 2022-09-15

ShareRelated Documents
Running Head: VPN
Name of Subject
Name of Assignment
Name of Student
ID of Student
Date of Submission
Assignment | The aim of this report is to analyse and understand the process and features of security of the emerging technologies._1
VPN
1
Table of Contents
Introduction.............................................................................................................3
Literature Review.....................................................................................................3
Access control and Authentication..........................................................................4
TLS and SSL analysis............................................................................................4
Confidentiality and Integrity Process.......................................................................8
Protection against Replay Processes.....................................................................10
Remote Access......................................................................................................10
Conclusion.............................................................................................................11
Reference..............................................................................................................12
Assignment | The aim of this report is to analyse and understand the process and features of security of the emerging technologies._2
VPN
2
Introduction
The aim of this report is to analyse and understand the process and
features of security of the emerging technologies. This analysis will also give a
brief idea about the emerging technologies enables the networks’ of organisations
to remotely access the networks without disturbing the security structure of that
organisation. In order to support this report, it also discusses the points of access
control and authentication, remote access of the protocols, confidentiality and
integrity, protection in respect to the reply process occurred in that network. A
brief overview of the technologies and their working is discussed along with
available opportunities in that field.
Literature Review
The purpose behind conducting the analysis is to explain the services and
methods of security related to the technologies that has the capabilities of
transferring data throughout the internet. A detailed explanation is presented
below about the aspects mentioned:
Virtual Private Network (VPN)- The virtual private network works as the
interconnection or secured link between the server of internet and the
devices used in that network. The virtual private network works in the
organisation file of network. The virtual private network also help in
protecting the phishing attack as well as internet spoofing[13]. It is also
observed that the VPN has the ability in protecting the traffic that occurs in
internet. In the process of protecting the internet traffic the VPN allows the
organisation to use their IP address by hiding it. The VPN also unblocks the
websites that are censored. The VPN has variable protocols like SSTP, Open
VPNto, L2TP/IPSec, PPTP, and IKEv2, to protect the process of data
transmission [1].
Followed by the above there are two significant types of VPNs that is IPSec
VPN and SSL VPN.
The differences between the above two type of VPN is that the SSL VPN
Assignment | The aim of this report is to analyse and understand the process and features of security of the emerging technologies._3
VPN
3
initiates the connection of the network for SSL VPN whereas the IPSec VPN
initiates a connection between a site with a site of the HO and BO.
The observation of the analysis of Cisco ASA 5500 is that it protects the
server network from the attacks of malware which is a primary concern of
that application. It gives efficient anti-phishing, web filtering and anti-spam
with respect to IPSec VPN’s. IKE has several operation and those operations
has a significant role in the application of Cisco ASA 5500 [14]. This
application of IKE enables the operator in protecting its server from the
access made by several unauthorized servers [2].
From the above observation it can be stated that the VPN has an effective
impact on the business of IT structure. It enables the VPN to protect the
network of the organisation from the threats occurring external to the
network. The threats can be hacking, attack of spoofing[16]. Another
application of this is to enables the network of the organisation to transmit
data securely. Addition to this it also allows in accessing the data remotely
and reduce the censorship globally. All the features mentioned before
enhances the IT organisations’ services more.
The aspect of connection of portable devices to the network has enhanced
the effective application of AnyConnect by the Cisco[15]. It has also
designed the devices in such a way that the devices are verified and
connected to all the available devices nearby. Therefore, the ultimate aim
of the structure of the devices are to get connected to the other devices as
well as authenticate them by AnyConnect and enable them to connect and
access the server of the internet.
Access control and Authentication
1. It is observed that authentication has always played an important role in
connecting to the authenticate server. The serves gets majorly attacked by
the harmful attacks in order to connect to the authenticate server. The
various protocols when followed by the user can help them in their
authenticated operation and those servers are HHTPS,SSL, and TLS. These
servers follow the most efficient process of encryption in order to send the
Assignment | The aim of this report is to analyse and understand the process and features of security of the emerging technologies._4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
REPORT ON VIRTUAL PRIVATE NETWORK
|12
|1820
|59

Types of VPN and Encryption Techniques
|13
|2690
|49

Report on Virtual Private Network 2022
|12
|2383
|26

Virtual Private Network (VPN) Report 2022
|14
|2220
|21

Virtual Private Network (VPN) | Literature Review
|6
|926
|72

SSL/TLS VPN Technologies: Significance, Role, Advantages, and Security
|9
|2008
|427